King formally removes Andrew Mountbatten Windsor's prince title and his HRH style by issuing Letters Patent
My ear won't stop itching. How can I make it stop? DR KAYE reveals the terrifying cause... and how to cure yourself for good
AMD Confirms Zen 5 RNG Flaw: When ‘Random’ Isn’t Random Enough
AMD has officially confirmed a high-severity security vulnerability in its new Zen 5–based CPUs, and it’s a nasty one because it hits cryptography right at the source: the hardware random number generator.
Here’s a clear breakdown of what’s going on, how bad it really is, and what you should do if you’re running Zen 5.
What AMD Just ConfirmedAMD’s security bulletin AMD-SB-7055, now tracked as CVE-2025-62626, describes a bug in the RDSEED instruction on Zen 5 processors. Under certain conditions, the CPU can:
-
Return the value 0 from RDSEED far more often than true randomness would allow
-
Still signal “success” (carry flag CF=1), so software thinks it got a good random value
The issue affects the 16-bit and 32-bit forms of RDSEED on Zen 5; the 64-bit form is not affected.
Because RDSEED is used to feed cryptographically secure random number generators (CSPRNGs), a broken RDSEED can poison keys, tokens, and other security-critical values.
AMD classifies the impact as:
Loss of confidentiality and integrity (High severity).
How the Vulnerability Works (In Plain English) What RDSEED Is Supposed to DoModern CPUs expose hardware instructions like RDRAND and RDSEED:
-
RDRAND: Gives you pseudo-random values from a DRBG that’s already been seeded.
-
RDSEED: Gives you raw entropy samples suitable for seeding cryptographic PRNGs (it should be very close to truly random).
Software like TLS libraries, key generators, HSM emulators, and OS RNGs may rely directly or indirectly on RDSEED to bootstrap secure randomness.
What’s Going Wrong on Zen 5On affected Zen 5 CPUs:
-
The 16-bit and 32-bit RDSEED variants sometimes return 0 much more often than a true random source should.
-
Even worse, they simultaneously report success (CF=1), so software assumes the value is fine rather than retrying.
In cryptographic terms, this means:
-
Entropy can be dramatically reduced (many key bits become predictable or even fixed).
-
Keys or nonces derived from those values can become partially or fully guessable.
Here's where you can view the Norwich to Tilbury pylon plans ahead of land order
Greater Anglia honours Braintree and Witham station adopters
Two Essex men spared jail over attack that disfigured victim
Here's where you can view the Norwich to Tilbury pylon plans ahead of land order
'Quick-thinking' Essex boy, 12, helped police catch repeat car thief
Kate Garraway reignites Celebrity Traitors feud with 'suspicious' Clare Balding live on air - swiping 'you can see what it's like, I'm at the roundtable all over again!'
Identity fraud illegal migrant escapes deportation back to China - because she is too old
OpenAI CFO Says Company Isn't Seeking Government Backstop, Clarifying Prior Comment
Read more of this story at Slashdot.
Attacking Interconnects And Networks Across All Scales
There are two competing forces in IT, and they are at play during the GenAI era as much as they have ever been during prior eras in the datacenter. …
Attacking Interconnects And Networks Across All Scales was written by Timothy Prickett Morgan at The Next Platform.
Pathologist, 68, died of overdose after staff at his own NHS trust mistakenly gave him wrong medication for a chest infection
You're cooking pasta wrong! Scientists reveal the exact amount of salt you should add to your water - and it's probably a lot MORE than you think
Victoria Beckham's new title after David receives knighthood
Agents of misfortune: The world isn't ready for autonomous software
Opinion The agentic era remains a fantasy world. Software agents, the notional next frontier for generative AI services, cannot escape the gravity of their contradictions, legal ambiguities, and competitive pressures. Not everyone, especially not competing businesses, wants a bot representing the customer.…