This applies to both Intel and AMD, so users of any product need not be overly alarmed.
When AMD learns that the discovery of this new attack on speculative execution features used by many chipmakers' products, AMD immediately collaborates with the ecosystem as a whole.
Security researchers found three ways to attack in this presumptive execution study, a detailed description of each attack, AMD's response is as follows:
Way one isBypass the border check.
AMD processors can be addressed through software / operating system updates from system vendors and manufacturers with minimal performance impact.
Way two isBranch target injection.
Due to the different AMD architecture, the risk of using this approach to attack is almost zero, not yet found on AMD processors related vulnerabilities.
Way three isMalicious data cache load.
Due to different AMD architectures, the vulnerability does not exist on AMD products.
AMD also strongly recommends that users always take security measures such as: Do not click on unknown links, enforce strong password protocols, use secure networks, and perform regular software updates.