- OpenAI, SoftBank, Oracle lead $500B Project Stargate to ramp up AI infra in the US
- 오픈AI, 700조원 규모 'AI 데이터센터' 프로젝트 착수··· 소프트뱅크·오라클 참여
- From Election Day to Inauguration: How Cybersecurity Safeguards Democracy | McAfee Blog
- The end of digital transformation, the rise of AI transformation
- 줌, '팀챗' 업데이트··· "사이드바 통해 업무 간소화"
AMD addresses Sinkclose vulnerability but older processors left unattended
“AMD’s decision to exclude older processors from the ‘Sinkclose’ vulnerability patch risks damaging customer trust and brand loyalty,” said Arjun Chauhan, senior analyst at Everest Group. “Enterprises using these still-popular chips may feel neglected, leading to dissatisfaction and potentially driving them to consider competitors who offer longer support lifecycles.”
Notably, AMD’s recently released Ryzen 9000 and Ryzen AI 300 series processors are not included in the update list, though it is believed that these models may have had the vulnerability addressed at the factory.
For users of AMD’s older processors, the company recommends taking standard security precautions, though the absence of a patch may leave some systems more exposed to potential threats. Despite the sophisticated nature of the “Sinkclose” exploit, which typically requires access to the system kernel and is often associated with state-sponsored hackers, users are advised to stay vigilant.