{"id":1119,"date":"2018-05-22T21:20:56","date_gmt":"2018-05-22T21:20:56","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132199"},"modified":"2018-05-22T21:20:56","modified_gmt":"2018-05-22T21:20:56","slug":"researchers-say-more-spectre-related-cpu-flaws-on-horizon-2","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/","title":{"rendered":"Researchers Say More Spectre-Related CPU Flaws On Horizon"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/22165506\/variant-4.jpeg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>After another speculative execution side channel-related flaw has been disclosed in processors,\u00a0 security experts say that more may be on the horizon.<\/p>\n<p>Researchers on Monday disclosed Variant 4, a new speculative execution side channel category flaw that allows attackers to read privileged data across trust boundaries. Variant 4 is similar to two side channel analysis vulnerabilities, Meltdown and Spectre, that came into the spotlight\u00a0<a href=\"https:\/\/threatpost.com\/vendors-share-patch-updates-on-spectre-and-meltdown-mitigation-efforts\/129307\/\">earlier this year\u00a0<\/a>in an array of Intel server and\u00a0desktop processors.<\/p>\n<p>And that may not be the end. \u201cEveryone thought there would be lots more of these types of vulnerabilities,\u201d \u00a0Tod Beardsley, principle security research manager\u00a0of Rapid7, told Threatpost. \u201cI would be shocked if there wasn\u2019t something else out there being discussed under embargo right now.\u201d<\/p>\n<p>Speculative execution has long existed in processors \u2013 but researchers say that as the cache that exists on processors grows to keep up with their speed, so to does the risk of exploiting \u00a0this type of flaw.<\/p>\n<p>\u201cI think people will figure out more ways around this type of vulnerability\u2026 it\u2019s a foundational architecture issue,\u201d said Martin Reynolds, VP and Gartner Fellow in an interview with Threatpost. \u201cThis is a very broad vulnerability that goes back a long time, but in recent years we\u2019ve seen them grow more vulnerable\u2026 The thing that makes it different now is that they\u2019re doing it with such long strings of code now that they\u2019re trying to get in there and send more signals.\u201d<\/p>\n<p>The problem is that to stay faster and perform better, processors use a trick which use speculative execution of memory to read before the addresses of all prior memory writes are known.<\/p>\n<p>The most common form of speculative execution involves a program\u2019s control flow. The processor essentially predicts the control flow using a highly sophisticated set of mechanisms instead of waiting for all branch instructions to resolve to determine which operations are needed to execute.<\/p>\n<p>While this method acts as a buffer so processors can then quickly skip to other processes and stay\u00a0as optimal as possible, it also enables an attacker with local user access using a side-channel analysis to gain unauthorized disclosure of information.<\/p>\n<p>\u201cSo this gap continues to grow, and that\u2019s why in recent years we\u2019ve seen these things grow more vulnerable,\u201d said Reynolds. \u201cBefore that, processors didn\u2019t have enough memory, enough speculative execution where you could do anything useful.\u201d<\/p>\n<p>In the case of Variant 4, which is a speculative store bypass method, it takes advantage of a performance feature present in many high- performance processors that \u201callows loads to speculatively execute even if the address of preceding potentially overlapping store is unknown,\u201d according to Intel.<\/p>\n<p>Speculative execution side-channel attacks are difficult to exploit; but not impossible. Intel for its part said that it is not aware of a successful browser exploit for Variant 4. Furthermore, the risks surrounding Varant 4 do not lead to a mass attack, but narrow customized attacks where someone uses a specific attack for one system.<\/p>\n<p>\u201cVariant 4 is mostly being discussed in a fairly narrow scope: accessing specific unpatched browser\u2019s private data,\u201d said Rob Tate, researcher at WhiteHat Security. \u201cIf an attacker has access to run code on a machine, there are already a number of simpler (and more universal) techniques to try before resorting to this, and it\u2019s far from the wide-reaching implications of the original Spectre.\u201d<\/p>\n<p><strong>Patching Problems<\/strong><\/p>\n<p>While it may be hard to exploit a speculative execution side channel vulnerability, it is also notoriously difficult to patch that type of flaw as well.<\/p>\n<p>\u201cIt\u2019s hard to fix these, especially when it impacts an install base that\u2019s so big,\u201d said Reynolds. \u201cYou can fix variants in the OS, as Google and Amazon have done for Spectre, to eliminate the problem, or can change the microcode of the microprocessor itself, but that may make the system slower.\u201d<\/p>\n<p>Spectre and Meltdown also infamously faced messy\u00a0<a href=\"https:\/\/threatpost.com\/intel-issues-updated-spectre-firmware-fixes-for-newer-processors\/130025\/\">patching efforts<\/a>\u00a0across the industry in the wake of the vulnerability disclosure after acknowledging that its patches caused \u201chigher than expected reboots and other unpredictable system behavior.\u201d Variant 4 may be on the same path \u2013 Intel said on Monday the fixes for the flaw could also impact performance by between 2 and 8 percent for certain systems.<\/p>\n<p>Another challenge to patching flaws like Spectre, Meltdown and Variant 4 is the immense amount of coordination it takes from an array of vendors, said Beardsley. \u00a0Already, vendors such as Red Hat, AMD, ARM, IBM and Microsoft have come <a href=\"https:\/\/threatpost.com\/intel-responds-to-news-of-spectre-like-flaw-in-cpus\/132169\/\">forward\u00a0<\/a>discussing their future approaches to Variant 4.<\/p>\n<p>Intel, for its part, said that the speculative store bypass method mitigation for Variant 4 can be accomplished through modifying the software of impacted code or setting a new Speculative Store Bypass Disable MSR bit through software.<\/p>\n<p>\u201cAs speculative store bypass can only occur when a load is able to execute before an older store with an overlapping address computes its address, an LFENCE between that store and the subsequent load is sufficient to prevent this case,\u201d the company said in a <a href=\"https:\/\/software.intel.com\/sites\/default\/files\/managed\/b9\/f9\/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf\">white paper\u00a0<\/a>about the vulnerability. \u201cSoftware should be careful to apply this mitigation judiciously to avoid unnecessary performance loss.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/researchers-say-more-spectre-related-cpu-flaws-on-horizon\/132199\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yet another speculative execution side channel flaw has been disclosed in processors &#8211; and security experts warn that more may be out there. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1120,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[65,697,67,698,68,699,661,19,69],"class_list":["post-1119","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-intel","tag-intel-vulnerability","tag-meltdown","tag-side-channel-flaw","tag-spectre","tag-speculative-execution-flaw","tag-variant-4","tag-vulnerabilities","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers Say More Spectre-Related CPU Flaws On Horizon 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers Say More Spectre-Related CPU Flaws On Horizon 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-22T21:20:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researchers Say More Spectre-Related CPU Flaws On Horizon\",\"datePublished\":\"2018-05-22T21:20:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/\"},\"wordCount\":861,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg\",\"keywords\":[\"Intel\",\"Intel Vulnerability\",\"Meltdown\",\"side channel flaw\",\"Spectre\",\"speculative execution flaw\",\"Variant 4\",\"Vulnerabilities\",\"Web Security\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/\",\"name\":\"Researchers Say More Spectre-Related CPU Flaws On Horizon 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg\",\"datePublished\":\"2018-05-22T21:20:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg\",\"width\":4992,\"height\":3328},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intel\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/intel\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Researchers Say More Spectre-Related CPU Flaws On Horizon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers Say More Spectre-Related CPU Flaws On Horizon 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/","og_locale":"en_US","og_type":"article","og_title":"Researchers Say More Spectre-Related CPU Flaws On Horizon 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-22T21:20:56+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-1024x683.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researchers Say More Spectre-Related CPU Flaws On Horizon","datePublished":"2018-05-22T21:20:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/"},"wordCount":861,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg","keywords":["Intel","Intel Vulnerability","Meltdown","side channel flaw","Spectre","speculative execution flaw","Variant 4","Vulnerabilities","Web Security"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/","url":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/","name":"Researchers Say More Spectre-Related CPU Flaws On Horizon 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg","datePublished":"2018-05-22T21:20:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/researchers-say-more-spectre-related-cpu-flaws-on-horizon.jpg","width":4992,"height":3328},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researchers-say-more-spectre-related-cpu-flaws-on-horizon-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Intel","item":"https:\/\/www.threatshub.org\/blog\/tag\/intel\/"},{"@type":"ListItem","position":3,"name":"Researchers Say More Spectre-Related CPU Flaws On Horizon"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1119"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1119\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1120"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}