Skip to main content

Intel Suffers Data Breach, 20GB of Confidential Information Leaked Online Report

 Intel Suffers Data Breach, 20GB of Confidential Information Leaked Online Report


File:Intel Team Inside Facebook Data Center.jpg - Wikimedia Commons


Intel appears to have survived the crash of internal information, with about 20GB of confidential information allegedly seized by an anonymous developer. Disposable information is said to include various internal archives - some of which have been sealed with "private" and "closed mystery" and have been subject to anonymous disclosure (NDA). There is also other evidence that removes the profile code as troubleshooting devices made by the chipmaker. Intel is currently researching the situation and acknowledges that the leave is based on the Intel Asset and Configuration Center.

Cyber Security Computer - Free image on PixabaySwiss program engineer and IT consultant Till Kottmann presented details regarding Intel's data break. Kottmann revealed the progress of the tweets to get information from an anonymous developer who came in with information recently. In addition, the engineer posted on twitter a screen capture giving a graphic information that has been clearly destroyed.

According to the screen capture, the data includes various Intel guidelines and encryption just as schemes, devices, and firmware of various processors are used. There are also organizational display formats and other NDAs.

"Unless I have a misconception about my source, I will be able to disclose to you that future pieces of this break will be nutritious and more," Kottmann said on twitter while recommending that more intelligence around the hole remains to be seen.

As shown by the ZDNet report, some security experts who do not want to be disclosed to the public have taken the issue lightly. Part of the leaked documents are said to include CPU manuals back in 2016. In addition, the developer of the program allegedly obtained this information through an unstable worker assisted by Akamai CDN.

Intel released a press release saying it was investigating the situation. "The data appears to be coming from the Intel Asset and Configuration Center, which contains data for use by our clients, its escorts and other external circles registered for access. We welcome the person to be downloaded and shared this information," the organization said.

ZDNet notes in its report that with the handling of the conversation between Kottmann and the program, the data was not available using the record at the Intel Asset and Configuration Center. In any case, a few reports that were a piece of land is said to have links to the Asset and Configuration Center.
Intel is not the only technology company that has tolerated data breach. The symbolism of the goliath Group is also considered to address the emergency that has brought the black power management. Wellness gadget manufacturer Garmin as well as the late arrivals with a digital attack that has affected its top executives in global markets.

Comments

Popular posts from this blog

Netwalker Goes After College of Nurses' Data in Ontario

T he cybercrime Netwalker team is guilty of extracting information from the Ontario Nursing College on ransomware attacks. A screenshot of information allegedly removed by the school has been posted on the Netwalker site, where the name of the school has been added to the number of injured people in the group. In a heated statement released yesterday, the school saw that it was affected by network security but did not indicate what had happened. The proclamation reads: "The College of the Nurses of Ontario (CNO) is currently pursuing normal operations following a network security incident. With the never-ending release of this episode on September 8, CNO found a way to prevent this incident and took over network protection. in a far-reaching legal examination. " As a result of this episode, the various administrations provided by the CNO are not easily accessible, including the public Register Find a Nurse, the Nursing Rehabilitation Center and the entrance gate. The CNO sai...

6 new Google Chrome flaws allow remote phone hacking | | Update Chrome or use BRAVE Browser

Cybersecurity experts have revealed the discovery of six security issues in Google Chrome, one of the world's most popular Internet browsers. Successful exploitation of these traits can create many vicious situations. Below is a brief description of the reported vulnerabilities, in addition to their scores and tracking keys according to the Common Vulnerability Scoring System (CVSS). CVE-2020-6493: This is a back-end risk that exists due to an error in the Google Chrome Web authentication feature.  A threatening actor can redirect victims to a malicious website to help them become vulnerable and create a code of opposition to the program. This error scored 7.7/10, so it is considered a serious difficulty. CVE-2020-6494: This risk exists due to insufficient confirmation of user inclusion in the Google Chrome payment item. Threatening actors can create a specially designed website, trick the victim into visiting it and lying about its contents. This is a very serious mistake, as it s...

LIVE Webinar on Zerologon Vulnerability Is Going To Take Place: Technical Analysis and Detection

  I'm sure most of you have now heard of a high-risk Windows server - called Zerologon - that would allow hackers to take over business networks completely. For those of you who don't know, in short, all supported versions of Windows Server applications are at risk of a serious patent infringement that resides in the Netlogon Remote Control Protocol for Domain Controllers. In other words, the primary vulnerability (CVE-2020-1472) can be exploited by the attacker to stop Active Directory services, and ultimately, the Windows domain without the need for authentication. What’s worse is that the exploitation of evidence of this error was released to the public last week, and soon after that, the attackers began exploiting vulnerabilities through programs that were not included in the wild. As explained in our compilation based on technical analysis published by Cynet's security analysts, the main problem is Microsoft's implementation of AES-CFB8, where it failed to use the ...