A new vulnerability called Retbleed has been discovered which attacks the AMD and Intel CPUs

The security experts have discovered one more vulnerability which was infecting several older AMD and Intel microprocessors which could result in Spectre-based speculative-execution attacks.

Spectre-based attacks causes a victim to purposely perform specific operations which does not happens during correct program execution and which then leaks the victim’s sensitive information via a side channel to the hackers.

Retbleed, a speculative execution attack, particularly known as Spectre-BTI, utilises the effects of speculative execution by a side channel to deceive a program. Retbleed invades into the memory space of the system and then leaks the private information.

Spectre attack relies on the hardware design errors to affect the instruction sequences of the system and release the encryption keys or passwords from the victim’s memory space. The confidential information is then achieved through the side channels like Flush+Reload which counts the time taken to perform memory hacking of the victim.

Because of the cyberattack, AMD has introduced Jmp2Ret for defending the hackers to steal data, while Intel has recommended enhanced Indirect Branch Restricted Speculation (eIBRS).

Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

function init() { var vidDefer = document.getElementsByTagName('iframe'); for (var i=0; i