Security News > 2020 > June > New Security Tech in Intel CPUs Protects Systems Against Malware Attacks

Intel on Monday unveiled a new security technology for its processors that will help protect systems against attack methods commonly used by malware.
Intel CET has two main components: indirect branch tracking, which should provide protection against jump oriented programming and call oriented programming attacks; and shadow stack, which provides return address protection against return-oriented programming attacks.
Intel has analyzed data from Trend Micro's Zero Day Initiative and found that nearly two-thirds of the 1,100 vulnerabilities disclosed last year were part of this category.
Intel pointed out that specifications for CET were published in 2016 and it has been working with Microsoft to create better protections against these types of attacks.
"This new Hardware-enforced Stack Protection feature only works on chipsets with Intel CET instructions. It relies on a new CPU architecture that is compliant with Intel CET specifications. For applications running on an OS that supports Intel CET, users can expect detailed guidance from our partners on how applications 'opt-in' for protection," explained Tom Garrison, VP of Client Computing Group and GM of Security Strategies and Initiatives at Intel.
News URL
Related news
- WP3.XYZ malware attacks add rogue admins to 5,000+ WordPress sites (source)
- Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks (source)
- Balancing usability and security in the fight against identity-based attacks (source)
- IPany VPN breached in supply-chain attack to push custom malware (source)
- MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks (source)
- Security pros more confident about fending off ransomware, despite being battered by attacks (source)
- New Apple CPU side-channel attacks steal data from browsers (source)
- Indian tech giant Tata Technologies hit by ransomware attack (source)
- Malware variants that target operational tech systems are very rare – but 2 were found last year (source)
- CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks (source)