Hardware-based machine learning detects ransomware and cryptojacking attacks in real time. Credit: Thinkstock Intel pulled the wraps off its latest vPro platform powered by its 12th Gen Core processors last week. The platform contains security enhancements including:Threat Detection Technology (TDT), a hardware-based way to detect ransomware in an efficient and timely mannerAnomalous behavior detection to identify living-off-the-land and supply chain attacksSilicon-based capabilities that support the next wave of expected operating system virtualization and chipset enhancements with fault injection to help prevent malicious code injectionsThreat Detection Technology uses machine learningTwo companies immediately announcing their support of the platform were ESET and ConnectWise. “Using Intel’s TDT, the detection of malware execution—including malicious encryption—is assisted through the use of machine-learning heuristics on suspicious patterns sourced directly from the CPU performance monitoring unit,” Előd Kironský, ESET’s chief of endpoint solutions and security technologies, explained in an interview. “The suspicious activity is shared with the ESET endpoint security solution, which then remediates the threat.”“An additional benefit provided by Intel TDT,” Kironský continued, “is the ability to off-load some of the processing demands of detecting ransomware to the Intel Integrated graphics controller, keeping the overall system performance high.”“Low impact to system performance is an area that ESET has always prioritized within its multi-layered software architecture and is a key selling point for many of our clients,” Kironský said in a news release. “Leveraging tech that can help us with prevention and protection, while also preserving performance, is a win-win choice.” TDT detects attacks from apps, browsers, or virtual machinesIntel’s technology can also thwart malicious actors using code obfuscation to avoid detection. “Since Intel TDT provides machine-learning behavioral detection, the ESET endpoint security solution will take the signals provided by Intel’s TDT to remediate the threat in those instances,” Kironský said.Another company hopping on the TDT bandwagon is ConnectWise, a software developer for IT solutions providers. It has announced it will integrate TDT into its Remote Monitoring and Management (RMM) software agent to allow it to identify and respond to security incidents rapidly. With TDT in RMM, ransomware and cryptojacking attacks can be detected, whether they come from a native app, within the browser, or from a virtual machine. With TDT, the company noted, RMM can detect and mitigate the most advanced attacks with greater precision and obtain more consistent results across all types of workloads.“SMBs are seeking simplified and turn-key cybersecurity solutions that are tightly integrated into their overall PC fleet management,” Carla Rodríguez, senior director for ecosystem partner enablement at Intel, said in a statement. “By integrating Intel TDT, ConnectWise customers on Intel-based devices will have access to powerful CPU-based threat detection that can be remediated from their RMM consoles with no additional security software to be purchased or implemented.” Related content feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem. By Maria Korolov Nov 29, 2023 9 mins Security Practices Vulnerabilities Security news Amazon’s AWS Control Tower aims to help secure your data’s borders As digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help. By Jon Gold Nov 28, 2023 3 mins Regulation Cloud Security news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Compliance Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe