ETH Zürich researchers have discovered that new Intel and AMD processors are still vulnerable to speculative execution attacks, despite existing mitigations. A flaw in Intel’s IBPB and AMD’s similar control allows cross-process Spectre attacks by bypassing security barriers on affected architectures, including Intel’s Golden Cove and AMD’s Zen processors. Intel and AMD have issued patches to address these vulnerabilities. Additionally, the researchers introduced "SpyHammer," a RowHammer variant that leverages DRAM temperature sensitivity to infer system activity and user behavior, posing new privacy risks.