Comment on Researchers discover new security vulnerability in Intel processors
prettybunnys@sh.itjust.works 3 weeks agoCVEs follow a naming convention, the exploit name is usually given by the researcher/hacker/whoever finds and documents it
Comment on Researchers discover new security vulnerability in Intel processors
prettybunnys@sh.itjust.works 3 weeks agoCVEs follow a naming convention, the exploit name is usually given by the researcher/hacker/whoever finds and documents it