Intel announced that it will soon introduce its hardware-based Control-flow Enforcement Technology security feature, first unveiled in 2016 and added to the company's 11th-generation CPUs, to Microsoft Edge, Google Chrome, Opera and other Chromium-based browsers, Bleeping Computer reports.
Intel CET acts as a safeguard against Return Oriented Programming and Jump Oriented Programming types of attacks by triggering exceptions as soon as ROP and JOP attacks initiate their attempts to modify the normal flow of applications. The feature is supported on Windows 10 through a process called Hardware-enforced Stack Protection.
Users running Windows 10 computers with either Intel 11th generation or AMD Zen 3 Ryzen CPUs, which have Intel CET supported, may verify that the security feature is supported in certain applications through Task Manager by filtering for Hardware-enforced Stack Protection.
Plans to integrate the feature into Mozilla’s Firefox browser was previously revealed but there has been no status update so far.
Jill Aitoro is senior vice president of content strategy for CyberRisk Alliance. She has more than 20 years of experience editing and reporting on technology, business and policy. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media’s VARBusiness and CRN and Penton Media’s iSeries News.
Liam Mayron from Fastly comes on the show to talk about his unique path into information security, the security implications of generative AI, advances in technologies to protect web applications, detecting bots, and enabling better MSP services!
This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!...
The European Union Agency for Cybersecurity (ENISA) has published a report on potential cybersecurity threats for 2030, trying to anticipate future security risks based on current trends and expert opinions. While some of the less likely predictions may touch on science fiction, the top two anticipated threats are already with us today: software supply chain compromises and AI-enhanced disinformation campaigns.