On International Anti-Ransomware Day 2025, new research highlighted the evolution and growing sophistication of ransomware-as-a-service (RaaS) over the past decade, transforming into a billion-dollar criminal enterprise. SentinelOne's senior threat researcher Jim Walter traced RaaS's development from early projects like TOX to current professionalized, affiliate-driven operations exemplified by groups such as LockBit. Concurrently, multiple serious security vulnerabilities have been disclosed affecting Intel processors, including a newly identified branch privilege injection flaw impacting all Intel CPUs since the Coffee Lake Refresh generation. These vulnerabilities allow attackers to extract sensitive data from privileged memory by exploiting speculative execution, posing risks particularly in shared hardware environments like cloud servers. Despite Intel releasing updated CPU microcode to address the issues, mitigations for Spectre-related attacks have been circumvented, undermining previous defenses and raising concerns about ongoing data leaks. The vulnerabilities also extend to Intel GPUs, broadening the scope of affected hardware. Researchers warn that these hardware flaws could enable novel ransomware attacks that bypass traditional software defenses by targeting CPUs directly.
Devastating Spectre CPU bug returns to haunt Intel processors https://t.co/Y9bSzHHihq https://t.co/Y9bSzHHihq
Intel has announced a load of new bugs afflicting its chips and this time it's not just CPUs but also GPUs that are involved, hooray! https://t.co/KkfhaU9jRd
Spectre vulnerability mitigations circumvented https://t.co/6EGPtsdXNp