Hardware security solutions like advanced instruction set architecture (ISA) extensions could revolutionize IT security by preventing malicious applications from accessing exploits. Examples include Capability Hardware Enhanced RISC Instructions (CHERI), which controls memory access and retains compatibility with existing software. ISA solutions could protect against memory safety vulnerabilities. The nature of open source technologies allows for collaborations, speeding up progress in the IT and security community.

Decrypting Linux/ESXi Akira Ransomware Files Without Paying Ransomware
A cybersecurity researcher has decrypted the Linux/ESXI variant of Akira ransomware, allowing data recovery without ransom. The method exploits a flaw in the malware’s encryption