Cybersecurity and Compliance Software for Enterprise and Government Organizations

NNT SecureOps™ provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls through advanced vulnerability management, intelligent change control and real-time breach detection.

The most comprehensive cyber security and continuous change control for EVERYTHING in IT and OT:

Security governance for any mix of:

  • On Prem, Cloud and Container
  • Virtual and Physical
  • Server and Appliance, ICS to IoT
  • Data Center to the Desktop
  • Microservice to Legacy Applications

Microsoft issued an emergency fix for the recently discovered Meltdown vulnerability found in Intel CPUs, but warn that it may cause compatibility problems with some AV tools.

Redmond issued the Windows 10 update earlier this week despite the monthly update coming up next Tuesday.

Despite the fix, Microsoft warned in an advisory that it was incompatible with a “small number” of AV products, claiming,” The compatibility issue is caused when anti-virus applications make unsupported calls into Windows kernel memory. These calls may cause stop errors (also known as blue screen errors) that make the device unable to boot. To help prevent stop errors caused by incompatible anti-virus applications, Microsoft is only offering the Windows security updates released on January 3, 2018 to devices running anti-virus software from partners who have confirmed their software is compatible with the January 2018 Windows operating system security update.

Users who’re affected can take advantage of built-in anti-virus protection, Windows Defender for Microsoft 10 devices or Microsoft Security Essentials for Windows 7 devices.

The advisory also contains the registry key AV vendors need to set in order for their customers to receive the updates.

Customers running earlier versions of Windows can expect a fix from Microsoft in next Tuesdays Upgrade release, and the firm is also “in the process of deploying mitigations to cloud services.”

Microsoft is just one of several firms scrambling to issue fixes to help protect customer’s sensitive information from the critical Meltdown vulnerability. The Meltdown vulnerability “melts” the security boundaries normally enforced at the chip level to allow normal applications to read the contents of private kernel memory.

 

Read the article on InfoSecurity Magazine

 

 

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.