L1tf Reloaded
Posted4 months agoActive4 months ago
bughunters.google.comTechstory
calmneutral
Debate
0/100
L1tfCPU VulnerabilitiesSecurity Research
Key topics
L1tf
CPU Vulnerabilities
Security Research
The post discusses a new CPU vulnerability, L1TF Reloaded, and its implications, with the community showing interest in the technical details.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
8m
Peak period
1
0-1h
Avg / period
1
Key moments
- 01Story posted
Sep 19, 2025 at 1:08 PM EDT
4 months ago
Step 01 - 02First comment
Sep 19, 2025 at 1:16 PM EDT
8m after posting
Step 02 - 03Peak activity
1 comments in 0-1h
Hottest window of the conversation
Step 03 - 04Latest activity
Sep 19, 2025 at 1:16 PM EDT
4 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45303991Type: storyLast synced: 11/17/2025, 4:06:19 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
We've demonstrated our attack on real-world KVM-based cloud solutions. Both Google Cloud [1] and AWS [2] wrote a blog post in response to this attack, where they describe how they mitigate against L1TF Reloaded and how they harden their systems against unknown transient execution attacks. Google also decided to award us a bug bounty of $151,515, the highest bounty of their Cloud VRP yet.
PoC is available at https://github.com/ThijsRay/l1tf_reloaded
[1] this submission
[2] https://aws.amazon.com/blogs/security/ec2-defenses-against-l...