Meltdown Spectre Check for Vulnerabilities

Meltdown Spectre Series: Meltdown Spectre Check for Vulnerabilities

Meltdown Spectre Check for Vulnerabilities (Meltdown Spectre Check for Vulnerabilities) This article is to provide you with the tools to check your operating systems for the Meltdown and Spectre vulnerabilities. These tools are available for Both Microsoft and Linux. Microsoft – Script You can acquire the Microsoft script from the following Link: SpeculationControl  To run script,…

Meltdown In Action

Meltdown Spectre Series: Meltdown In Action

Meltdown In Action The following article provides information on the CVE’s and video demonstrations of Meltdown in action.   What are CVE-2017-5753 and CVE-2017-5715? CVE-2017-5753 and CVE-2017-5715 are the official references to Spectre. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE. What is the CVE-2017-5754? CVE-2017-5754 is the official reference to…

Meltdown Spectre Patching

Meltdown Spectre Series: Patching

Meltdown Spectre Patching: (Meltdown Spectre Patching) In recent weeks, there has been a considerable amount of work done with patching Hardware and Operating Systems. A recent survey conducted by Barkley shows that only 4% of Enterprises are fully patched against Spectre and Meltdown. The following Links provide hotfixes/statements from the key/major vendors. It has been…

Meltdown Spectre Cloud Vendors

Meltdown Spectre Series: Cloud Vendors

Meltdown Spectre Cloud Vendors (Meltdown Spectre Cloud Vendors) The Meltdown and Spectre vulnerability has an significant impact on all Cloud Providers hosting services with multi-tenants. These new vulnerabilities can easily allow access to customer data. The Following links detail official message/information from Amazon Web Services and Microsoft Azure: Azure AWS Performance impact on AWS: Databricks stated…

Kemp advises on Dirty Cow Vulnerability – Are you Protected?

Dirty Cow is a computer security vulnerability for the Linux kernal, affecting Linux-based operating systems including Android devices. The Copy-On-Write vulnerability enables attackers to exploit the compromised Linux Machines by running code that enables them to escalate privileges to root and upload files that can be executed for malicious purposes. When the vulnerability is exploited,…

Dell SonicWALL NSA – Deeper security & performance without compromise

Looking for a comprehensive, high performing network security solution? The Dell SonicWALL NSA series not only provides business class security, but also provides versatile networking capabilities that improves performance while delivering maximum protection from sophisticated threats. Unlike other competing next generation firewalls, the Dell SonicWALL NSA series looks at all traffic regardless of port and…