Let Lyle Warnke with Intel explain the new features in Thunderbolt 4. He previews the new Tiger Lake Laptop and the new Thunderbolt 4 Docking Port.

Thunderbolt 4
Supports the full speed of 40Gb/s with cables of up to 2m in length
Supports two 4K displays instead of one (or one 8K display)
At least one port must provide 100W power for laptop charging
Thunderbolt 4 docks must support wake from sleep

Must offer DMA protection against Thunderspy attack


USB4 Specification Compliant
o Most complete and future proof version of USB-C Effortless Connectivity 
o More ways to connect accessories than ever before Secure & Manageable
o Intel VT-d based DMA protection Always Fast
o 40Gb/s for connecting to powerful Thunderbolt docks, monitors, fast storage and more Notebook Charging 
o Required on at least one computer port Mandatory Certification
o Consistent user experience across a wide range of product types and manufacturers


SC Mag

DoJ used court order to thwart ‘hundreds’ of Microsoft Exchange Server web shells

For the government to reach into private-sector systems to remove malware, apparently without the knowledge of the system owners, is unprecedented, said legal and security experts, and reflects the...

Attacker hacked one Microsoft Exchange server to gain access to others

The tactic is sophisticated, with firewalls unlikely to block traffic between Exchange servers and potentially giving such traffic a pass in terms of content inspection. The post Attacker hacked one...

Microsoft closes new critical Exchange vulnerability, urges patch ‘as soon as possible’

The alert about new exchange bugs come soon after on-premises Exchange customers were told to patch against a campaign actively exploiting a zero-day vulnerability. The post Microsoft closes new...

Understanding Florida’s water treatment hack, and how to stop future attacks

The attack on the Oldsmar, Fla., water treatment plant earlier this year raised the profile of operational technology events and attacks on critical infrastructure. Today’s columnist, Duncan...

‘Name:Wreck’ is the latest collision between TCP/IP and the standards process

The set of nine vulnerabilities in four popular TCP/IP stacks, including FreeBSD, show once again how complexities in the TCP/IP standards can ultimately leads to vulnerable products. The post...

61 percent of employees fail basic cybersecurity quiz

Nearly 70% of employees polled in a new survey said they recently received cybersecurity training from their employers, yet 61% nevertheless failed when asked to take a basic quiz on the topic. This...

No, the AWS bomb plot likely wouldn’t have shut down large parts of the internet

An alleged plot to blow up an AWS datacenter in Virginia would have caused damage, but standard backup and recovery practices of tier one cloud providers would have prevented "70% of the internet"...

Ransomware’s evolving tools and technical tactics confuse forensic analysis

Adversaries attempt to gain an upper hand by compromising the Active Directory, encrypting VM environments, and abusing Rclone. The post Ransomware’s evolving tools and technical tactics confuse...

Why enterprises are increasing cybersecurity budgets for 2021

In the wake of numerous high-profile breaches and rapid digital transformation amid COVID-19 pandemic, organizations across industries are looking to increase investments in security measures to...

Biden scores praise for nominations of White House, DHS cyber leaders

The announcement ends months of speculation over the key positions, during which time the government has had to face fallout from both the Solarwinds and Hafnium Exchange Server campaigns without...