{"id":59,"date":"2018-05-04T22:41:16","date_gmt":"2018-05-04T22:41:16","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/"},"modified":"2018-05-04T22:41:16","modified_gmt":"2018-05-04T22:41:16","slug":"fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/","title":{"rendered":"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel"},"content":{"rendered":"<p>Researchers have unearthed a fresh new set of ways attackers could potentially exploit data-leaking Spectre CPU vulnerabilities in Intel chips.<\/p>\n<p>German publication Heise <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.heise.de\/ct\/artikel\/Exclusive-Spectre-NG-Multiple-new-Intel-CPU-flaws-revealed-several-serious-4040648.html\">reported<\/a> that eggheads are preparing to disclose at least eight new CVE-listed vulnerability reports describing side-channel attack flaws in Chipzilla&#8217;s processors.<\/p>\n<p>&#8220;So far we only have concrete information on Intel&#8217;s processors and their plans for patches. However, there is initial evidence that at least some ARM CPUs are also vulnerable,&#8221; J\u00fcrgen Schmidt reported.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/10\/18\/shrugemojivector.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"intel\"\/><\/p>\n<h2 title=\"Been there, mitigated that, got the class actions, says Chipzilla\">Intel shrugs off \u2018new\u2019 side-channel attacks on branch prediction units and SGX<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/03\/28\/intel_shrugs_off_new_sidechannel_attacks_on_branch_prediction_units_and_sgx\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;Further research is already underway on whether the closely related AMD processor architecture is also susceptible to the individual Spectre-NG gaps, and to what extent.&#8221;<\/p>\n<p>The report notes that Intel has been alerted as to the exploit methods, though Chipzilla isn&#8217;t saying much on the matter right now.<\/p>\n<p>&#8220;Protecting our customers\u2019 data and ensuring the security of our products are critical priorities for us. We routinely work closely with customers, partners, other chipmakers and researchers to understand and mitigate any issues that are identified, and part of this process involves reserving blocks of CVE numbers,&#8221; executive VP and general manager of product assurance and security Leslie Culbertson said in a statement to <em>The Register<\/em>.<\/p>\n<p>&#8220;We believe strongly in the value of coordinated disclosure and will share additional details on any potential issues as we finalize mitigations.&#8221;<\/p>\n<p>The disclosure of new ways to leverage Spectre \u2013 which can be exploited by malicious software on a device or PC to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/04\/intel_amd_arm_cpu_vulnerability\/\">extract passwords and other secrets from memory<\/a> it shouldn&#8217;t be allowed to access \u2013 should hardly come as a shock, given the nature of the deep design flaw and how difficult it is for chip designers to fully address. Seemingly every <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/04\/04\/intel_spectre_microcode_updates\/\">few weeks<\/a>, brainiacs have <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/02\/14\/meltdown_spectre_exploit_variants\/\">found and written up<\/a> new variants and points of entry related to the bug, and new variations will <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/03\/26\/attacks_go_down_the_stack\/\">likely continue<\/a> to be found until chipmakers can get redesigned processors to market later this year.<\/p>\n<p>In the meantime, here are the lists of affected <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/facts-about-side-channel-analysis-and-intel-products.html\">Intel<\/a>, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.amd.com\/en\/corporate\/security-updates\">AMD<\/a>, and <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/developer.arm.com\/support\/arm-security-updates\">Arm<\/a> processor designs vulnerable to Spectre and its cousin Meltdown. Companies building this tech into their products, for example Qualcomm&#8217;s use of Arm cores in its smartphone chips, and the tons of vendors of Arm-powered internet-of-things gear, are also affected. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>Read More <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/05\/03\/just_your_monthly_reminder_that_the_spectre_bug_is_still_out_there\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chipzilla checking fresh set of CVEs in chip side-channel flaw Researchers have unearthed a fresh new set of ways attackers could potentially exploit data-leaking Spectre CPU vulnerabilities in Intel chips.\u2026 Read More HERE&#8230;<\/p>\n","protected":false},"author":1,"featured_media":60,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-59","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fresh fright of data-spilling Spectre CPU design flaws haunt Intel 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-04T22:41:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@thadmin\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/\"},\"author\":{\"name\":\"thadmin\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\"},\"headline\":\"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel\",\"datePublished\":\"2018-05-04T22:41:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/\"},\"wordCount\":406,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/\",\"name\":\"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg\",\"datePublished\":\"2018-05-04T22:41:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\",\"name\":\"thadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"caption\":\"thadmin\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thadmin\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/","og_locale":"en_US","og_type":"article","og_title":"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-04T22:41:16+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg","type":"image\/jpeg"}],"author":"thadmin","twitter_card":"summary_large_image","twitter_creator":"@thadmin","twitter_site":"@threatshub","twitter_misc":{"Written by":"thadmin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/"},"author":{"name":"thadmin","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66"},"headline":"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel","datePublished":"2018-05-04T22:41:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/"},"wordCount":406,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg","articleSection":["The Register"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/","url":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/","name":"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg","datePublished":"2018-05-04T22:41:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fresh-fright-of-data-spilling-spectre-cpu-design-flaws-haunt-intel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Fresh fright of data-spilling Spectre CPU design flaws haunt Intel"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66","name":"thadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","caption":"thadmin"},"sameAs":["https:\/\/x.com\/thadmin"]}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/60"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}