{"id":53102,"date":"2023-08-02T15:11:01","date_gmt":"2023-08-02T15:11:01","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34858\/Nearly-All-Modern-CPUs-Leak-Data-To-New-Collide-Power-Side-Channel-Attack.html"},"modified":"2023-08-02T15:11:01","modified_gmt":"2023-08-02T15:11:01","slug":"nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/","title":{"rendered":"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack"},"content":{"rendered":"<p><strong>A new side-channel attack method that can lead to data leakage works against nearly any modern CPU, but we\u2019re unlikely to see it being used in the wild any time soon.<\/strong>\n<\/p>\n<p>The research was conducted by a group of eight researchers representing the Graz University of Technology in Austria and the CISPA Helmholtz Center for Information Security in Germany. Some of the experts involved in the research discovered the notorious <a href=\"https:\/\/www.securityweek.com\/researchers-disclose-7-new-meltdown-spectre-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spectre and Meltdown vulnerabilities<\/a>, as well as several other <a href=\"https:\/\/www.securityweek.com\/new-side-channel-attack-targets-os-page-cache\/\" target=\"_blank\" rel=\"noreferrer noopener\">side-channel attack<\/a> methods.&nbsp;\n<\/p>\n<p>The new attack, dubbed <strong>Collide+Power<\/strong>, has been compared to Meltdown and a type of vulnerability named Microarchitectural Data Sampling (MDS).&nbsp;&nbsp;\n<\/p>\n<p>Collide+Power is a generic software-based attack that works against devices powered by Intel, AMD or Arm processors and it\u2019s applicable to any application and any type of data. The chipmakers are publishing their own advisories for the attack and the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-20583\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-20583<\/a> has been assigned.\n<\/p>\n<p>However, the researchers pointed out that Collide+Power is not an actual processor vulnerability \u2014 it abuses the fact that some CPU components are designed to share data from different security domains.\n<\/p>\n<p>An attacker can leverage such shared CPU components to combine their own data with data from user applications. The attacker measures CPU power consumption over thousands of iterations while changing the data they control, which enables them to determine the data associated with the user applications.&nbsp;\n<\/p>\n<p>An unprivileged attacker \u2014 for instance, by using malware planted on the targeted device \u2014 can leverage the Collide+Power attack to obtain valuable data such as passwords or encryption keys.&nbsp;<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p>The researchers noted that the Collide+Power attack enhances other power side-channel signals, such as the ones used in the <a href=\"https:\/\/www.securityweek.com\/platypus-hackers-can-obtain-crypto-keys-monitoring-cpu-power-consumption\/\" target=\"_blank\" rel=\"noreferrer noopener\">PLATYPUS<\/a> and <a href=\"https:\/\/www.securityweek.com\/new-hertzbleed-remote-side-channel-attack-affects-intel-amd-processors\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hertzbleed<\/a> attacks.\n<\/p>\n<p>\u201cPrevious software-based power side-channels attacks like PLATYPUS and Hertzbleed target cryptographic algorithms and needed precise knowledge of the algorithm or victim program executed on the target machine. In contrast, Collide+Power targets the CPU memory subsystem, which abstracts the precise implementation away as all programs require the memory subsystem in some way. Furthermore, any signal reflecting the power consumption can be used due to the fundamental physical power leakage exploited by Collide+Power,\u201d they explained.\n<\/p>\n<p>The researchers have published a paper detailing their work, as well as a dedicated <a href=\"http:\/\/collidepower.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Collide+Power website<\/a> that summarizes the findings.&nbsp;\n<\/p>\n<p>They describe two variants of the Collide+Power attack. In the first variant, which requires hyperthreading to be enabled, the attack targets data associated with an application that constantly accesses secret data, such as an encryption key.&nbsp;\n<\/p>\n<p>\u201cThe victim constantly reloads the secret into the targeted and shared CPU component during this process. An attacker running on a thread on the same physical core can now use Collide+Power to force collisions between the secret and attacker-controlled data,\u201d the researchers explained.&nbsp;\n<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"855\" height=\"255\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/CollidePower.png\" alt class=\"wp-image-34517\" srcset=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/CollidePower.png 855w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/CollidePower-360x107.png 360w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/CollidePower-768x229.png 768w\" sizes=\"auto, (max-width: 855px) 100vw, 855px\"><\/figure>\n<\/div>\n<p>The second variant of the attack does not require hyperthreading and it does not require the target to constantly access secret data.&nbsp;\n<\/p>\n<p>\u201cHere an attacker exploits a so-called prefetch-gadget within the operating system. This prefetch gadget can be used to bring arbitrary data into the shared CPU component and again force data collisions and recover the data,\u201d the experts said.&nbsp;\n<\/p>\n<p>While in theory the attack method could have significant implications, in practice the data leakage rates are relatively low and the method is unlikely to be exploited in the wild against end users any time soon.&nbsp;&nbsp;\n<\/p>\n<p>The researchers have managed to achieve a data leakage rate of 4.82 bits per hour in a scenario where the targeted application constantly accesses secret information and the attacker can directly read the power consumption of the CPU via the Running Average Power Limit (RAPL) interface, which directly reports a CPU\u2019s power consumption. At this rate, it would take the attacker several hours to obtain a password and several days to obtain an encryption key.&nbsp;\n<\/p>\n<p>In special circumstances, the researchers found that an attacker could achieve much higher data leakage rates, up to 188 bits\/h.&nbsp;\n<\/p>\n<p>\u201cAn attacker could achieve the 188 bits\/h leakage rate depending on the targeted application and the secret representation in memory. For example, if the key or password is in a cache line multiple times,\u201d Andreas Kogler, one of the TU Graz researchers involved in the project, told <em>SecurityWeek<\/em>.&nbsp;\n<\/p>\n<p>On the other hand, in real-world attack simulations, the researchers encountered practical limitations that significantly lowered leakage rates \u2014 more than one year per bit with throttling.&nbsp;\n<\/p>\n<p>Despite the relatively small risk that the attack poses today, the Collide+Power research highlights potential issues and paves the way for future research.&nbsp;\n<\/p>\n<p>As for mitigations, preventing such data collisions at the hardware level is not an easy task and would require the redesign of general-purpose CPUs. On the other hand, attacks can be prevented by ensuring attackers cannot observe power-related signals \u2014 this type of mitigation applies to all power side-channel attacks.&nbsp;\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/zenbleed-vulnerability-affecting-amd-cpus-can-expose-sensitive-information\/\">AMD CPU Vulnerability \u2018Zenbleed\u2019 Can Expose Sensitive Information<\/a>\n<\/p>\n<p><strong>Related<\/strong>:<a href=\"https:\/\/www.securityweek.com\/chipmaker-patch-tuesday-intel-amd-address-over-100-vulnerabilities\/\"> Chipmaker Patch Tuesday: Intel, AMD Address Over 100 Vulnerabilities<\/a>\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34858\/Nearly-All-Modern-CPUs-Leak-Data-To-New-Collide-Power-Side-Channel-Attack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53103,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8914],"class_list":["post-53102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinedata-lossflawintel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-02T15:11:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/CollidePower.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack\",\"datePublished\":\"2023-08-02T15:11:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/\"},\"wordCount\":853,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png\",\"keywords\":[\"headline,data loss,flaw,intel\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/\",\"name\":\"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png\",\"datePublished\":\"2023-08-02T15:11:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png\",\"width\":855,\"height\":255},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,data loss,flaw,intel\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinedata-lossflawintel\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/","og_locale":"en_US","og_type":"article","og_title":"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-02T15:11:01+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/CollidePower.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack","datePublished":"2023-08-02T15:11:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/"},"wordCount":853,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png","keywords":["headline,data loss,flaw,intel"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/","url":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/","name":"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png","datePublished":"2023-08-02T15:11:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack.png","width":855,"height":255},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,data loss,flaw,intel","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinedata-lossflawintel\/"},{"@type":"ListItem","position":3,"name":"Nearly All Modern CPUs Leak Data To New Collide+Power Side Channel Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53102"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53103"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}