Read the original article: Intel CET In Action
In this article, we’ll examine how effective CET is at mitigating real-world exploits that make use of ROP or stack based buffer overflow vulnerabilities.
The post Intel CET In Action first appeared on Offensive Security.
Read the original article: Intel CET In Action