<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/alerts/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Fri, 11 Apr 2014 02:39:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>The Heartbleed Bug: What is it and what to do about it Don&#039;t let it ruin your day</title>
		<link>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/</link>
					<comments>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 11 Apr 2014 02:30:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[heartbleed bug]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=964</guid>

					<description><![CDATA[The Heartbleed Bug announced on Monday 7th April has far reaching effects. See what it is about and what you can do about it.]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignleft size-medium wp-image-965" alt="heartbleed" src="https://www.interxect.com/main/wp-content/uploads/2014/04/heartbleed-247x300.png" width="247" height="300" />There is a serious bug out there that can compromise your data and you probably wouldn&#8217;t know it.<span id="more-964"></span></p>
<h2>The Bleeding Heart Bug</h2>
<p>The Heartbleed bug (CVE-2014-0160) was <a href="https://www.openssl.org/news/secadv_20140407.txt" target="_blank">publicly disclosed on Monday</a> and affects specific versions of the OpenSSL application. OpenSSL is a generally used open-source implementation of the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) Cryptographic method and is used on about 66% of all public websites. The bug has been present in the software since December 2011.</p>
<p>The bug is not a weakness in SSL/TLS itself, but rather is bug in OpenSSL implementation of it that can potentially allow attackers to access the unencrypted data stored within a server&#8217;s memory. With enough data, an attacker can find out your server encryptions keys, your passwords and any other information passed over the communication. The attackers can then use the compromised keys to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.</p>
<h2>Who are vulnerable?</h2>
<p>Because of the widespread adoption of the OpenSSL software and the ability to be attacked without leaving a trace, it means that we are all vulnerable because you can&#8217;t tell if your data has been compromised.</p>
<p>Not only websites are vulnerable, as many hardware and software vendors implement use OpenSSL in their products. <a href="http://www.networkworld.com/news/2014/041014-heartbleed-cisco-juniper-280593.html" target="_blank">Cisco and Juniper has listed advisories warning of the bug in their products</a>.</p>
<h2>What should you do?</h2>
<p>All businesses, website owners and users of affected services should take action on this bug.</p>
<p><strong>Step 1: Determine if any of your servers may be affected.</strong></p>
<p>You can use the <a href="http://filippo.io/Heartbleed/" target="_blank">check script on Filippo Valsorda&#8217;s web site</a> to check your public services.</p>
<p>Check with vendors if any of your internal services may be affected.</p>
<p><a href="http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/" target="_blank">C|NET has a list of the top 100 sites around the web to determine if they have been patched or may be affected</a></p>
<p>Website owners with their sites on hosted services should check with their service provider if they have taken action on the bug and if they were ever vulnerable.</p>
<p><strong>Step 2: Patch services for which you are able to patch yourself.</strong></p>
<p>These include any owned servers or virtual servers that you use, or internal, private servers or devices.</p>
<p><strong>Step 3: Re-Key your SSL Certificates</strong></p>
<p>This involves regenerating and reinstalling the private keys on your servers. While the risk may be small, the fact that you will not know if your key was compromised, this is a recommended precautionary step.</p>
<p><strong>Step 4: Change your passwords</strong></p>
<p>It&#8217;s important that you change any passwords that you may have on any of the affected systems AFTER you have patched OpenSSL and re-keyed your certificates. Doing so before you performed the prior steps means that if your keys were compromised, an attacked would be able to discover your new passwords.</p>
<p>If you are a service user and don&#8217;t run any services yourself, find out from the provider if they were vulnerable and if they patched their services (or use the check script in Step 1).</p>
<h2>Don&#8217;t Panic</h2>
<p>While the bug is serious, it&#8217;s important to not panic. Keep a clear head and follow the steps.</p>
<p>For more information about the bug and to keep updated <a href="http://heartbleed.com/" target="_blank">check out heartbleed.com</a>.</p>
<p>Original article: <a href="https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/" rel="bookmark" title="Permanent link to 'The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small>'">The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">964</post-id>	</item>
		<item>
		<title>Trend Micro &#8211; Cybercrime on the Rise in Latin America and the Caribbean ... and what we can do about it!</title>
		<link>https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/</link>
					<comments>https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 03 May 2013 16:45:52 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Caribbean]]></category>
		<category><![CDATA[reports]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[trends]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=691</guid>

					<description><![CDATA[Trend Micro, working jointly with the Organization of American States (OAS), released a study outlining the current state of cybersecurity in Latin America and the Caribbean. I read the reports and have distilled some of the highlights for you.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2013/05/Fotolia_19006864_XS.jpg"><img decoding="async" class="size-post-image wp-image-692 alignleft" alt="cybercrime" src="https://www.interxect.com/main/wp-content/uploads/2013/05/Fotolia_19006864_XS-250x200.jpg" width="250" height="200" /></a>Today Trend Micro, working jointly with the Organization of American States (OAS), released a study outlining<a title="The State of Cybersecurity in Latin America" href="http://blog.trendmicro.com/trendlabs-security-intelligence/the-state-of-cybersecurity-in-latin-america/" target="_blank"> the current state of cybersecurity in Latin America and the Caribbean</a>. The study, while not eye opening – many of the risks have been known by IT Security Professionals for some time – offers a real qualitative and quantitative study of the cybersecurity threats that exists in the region.</p>
<p>While the report focused more on Latin America (the only Caribbean country with significant attention was Jamaica), our close proximity to South and Latin America means that we should consistently remain abreast of the developments there.</p>
<p>I read the reports and have distilled some of the highlights for you.<span id="more-691"></span></p>
<h2>In General</h2>
<p>A general increase in cyber incidents were reported by most countries. However, the belief is that this was due to better detection and security mechanisms put in place, indicating that attacks were happening all the time but were previously undetected. The report noted that in many instances there was no rating or scale used for the incidents that were detected.</p>
<h2>Growth of Hactivism</h2>
<p>An interesting trend that was noted was the growth in hacktivism or politically motivated hacking. These instances were not driven by financial gain, but were coordinated attack campaigns in response to legislative initiatives. These attacks brought the issue of cyber security to the forefront, and may have provided some benefit by making those in authority more aware of the threats out there.</p>
<h2>Financial Losses</h2>
<p>The report wasn’t able to quantify the losses caused by hacking, stating that it was impossible to gather, but still said that it was very high, possibly even greater than losses of any other form of crime. I find this a rather dubious claim though, and would prefer to see more evidence before stating such.</p>
<h2>Threat to Industrial Control Systems</h2>
<p>Industrial Control Systems (ICS) are at an even greater risk in the region, than in many other parts of the world. I gather that the report also included financial, transportation, healthcare, and telecommunications as having ICS. Trend micro found many ICS devices connected to the Internet, possibly for remote management and administration. This may not be a problem in itself, but it found that these systems will both unprotected by a password or unpatched. I know of a few cyber scams that have hit telecommunications companies within the region, but none that have hit industrial systems… as yet!</p>
<h2>Keeping up with Cybercriminals</h2>
<p>Trend micro found that the hackers in the region were learning from their counterparts in other developed countries, mainly from Eastern Europe. Meanwhile, law enforcement authorities were having a hard time keeping up with the cybercrime developments. The report cited inexperienced cybercrime investigators and the shortage of prosecutors who specialize in technology related offenses. There is also a need for highly skilled professionals who can secure networks, diagnose intrusions, and effectively manage cyber incidents.</p>
<h2>Inadequate Security and Awareness of the General Citizenry</h2>
<p>One of the conclusions formed was that the greatest form of attack was via file infections. This is an indication of insufficient security mechanisms on personal PCs and a lack of awareness of the general citizenry of how to protect themselves from cyber threats.</p>
<h2>Impediments to Cybersecurity within the Region</h2>
<p>The report brought to fore some of the major issues impeding the region’s cyber security efforts.</p>
<ul>
<li>Lack of information being shared about security events such as breaches, intrusion attempts, or attacks.</li>
<li>Lack of law enforcement or federal laws and regulations.</li>
<li>Skewed data about security incidents that may not be factual or just anecdotal evidence (“I heard that this happend&#8230;”).</li>
<li>Differing standards as to what constituted a cyber incidents. Some countries only counted attacks on the Government as incidents, while others count everything.</li>
<li>Lack of National Computer Security Incident Response Team (CSIRT).</li>
<li>Lack of highly skilled professionals in the area of cyber security.</li>
</ul>
<h2>Recommendations</h2>
<p>The report included three recommendations for governments and organizations in the region to help improve the state of cyber security.</p>
<ol>
<li>Raise awareness of safe cyber habits and general cybersecurity awareness among Internet users, critical infrastructure operators, and government employees.</li>
<li>Invest in and promote enrollment in technical degree programs to ensure an ample pool of qualified candidates from which to draw professionals that would be needed to fill the increasing number of information security careers.</li>
<li>Continue strengthening policy mechanisms to assign governmental roles and responsibilities related to cyber security and codifying information sharing and cooperation mechanisms.</li>
</ol>
<p>I would also include that the formation of CSIRT’s at both the organizational and the national levels, even at the regional level. This would help coordinate activities in addressing cyber security. And while I do not think we need to go as far as having degree programs, we do need to increase the pool of people who deeply know information security.</p>
<p>I recommend that you read <a title="Latin American and Caribbean Cybersecurity Trends and Government Responses" href="http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-latin-american-and-caribbean-cybersecurity-trends-and-government-responses.pdf" target="_blank">the report here (pdf)</a>, and please forward it to others, especially those in the position to take the cause forward.</p>
<p><em id="__mceDel">Do you think that enough efforts are being made to improve cyber security at both the organizational and that the governmental levels? Leave your comments below.</em></p>
<p>Original article: <a href="https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/" rel="bookmark" title="Permanent link to 'Trend Micro &#8211; Cybercrime on the Rise in Latin America and the Caribbean <small class="subtitle">... and what we can do about it!</small>'">Trend Micro &#8211; Cybercrime on the Rise in Latin America and the Caribbean <small class="subtitle">... and what we can do about it!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/trend-micro-cybercrime-on-the-rise-in-latin-america-and-the-caribbean/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">691</post-id>	</item>
		<item>
		<title>Widespread Attack on WordPress Websites</title>
		<link>https://www.interxect.com/widespread-attack-on-wordpress-websites/</link>
					<comments>https://www.interxect.com/widespread-attack-on-wordpress-websites/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 13 Apr 2013 13:12:32 +0000</pubDate>
				<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=686</guid>

					<description><![CDATA[Over the past 3-4 days there have been a widespread, distributed attack on Wordpress sites.]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-post-image wp-image-687" alt="Wordpress Login" src="https://www.interxect.com/main/wp-content/uploads/2013/04/wordpress_login_admin-250x200.png" width="250" height="200" />Over the past 3-4 days there has been a widespread, distributed attack on WordPress sites according to this article by <a title="Hackers Point Large Botnet At WordPress Sites To Steal Admin Passwords And Gain Server Access" href="http://techcrunch.com/2013/04/12/hackers-point-large-botnet-at-wordpress-sites-to-steal-admin-passwords-and-gain-server-access/" target="_blank">TechCrunch</a>.</p>
<p>The attacks use bots to attempt a brute force attack on WordPress installations using the default &#8220;admin&#8221; username and a dictionary of passwords.</p>
<p>Many websites, including ours, run on WordPress. It is recommended that you use a different administrative username and a strong password. Even if you are using a different administrative username, you should still use a strong password. See our article &#8211; <a title="5 Tips To Help You To Secure and Manage Your Passwords" href="https://www.interxect.com/main/2012/06/5-tips-to-help-you-to-secure-and-manage-your-passwords/" target="_blank">5 Tips To Help You To Secure and Manage Your Passwords</a> &#8211; on tips for strong password creation.</p>
<p>The attacks have died down over time, and many ISPs have put in measures to secure their users. Our ISP put out this <a title="Widespread Attack on WordPress Installations" href="http://www.site5.com/blog/s5/widespread-attack-against-wordpress-installations/20130412/" target="_blank">notice</a> yesterday. But this is no reason to relax. Security is about eternal vigilance, and you can bet that the next wave is coming.</p>
<p>Original article: <a href="https://www.interxect.com/widespread-attack-on-wordpress-websites/" rel="bookmark" title="Permanent link to 'Widespread Attack on WordPress Websites'">Widespread Attack on WordPress Websites</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/widespread-attack-on-wordpress-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">686</post-id>	</item>
		<item>
		<title>MySQL Vulnerability Allows Attackers to Bypass Password Verification</title>
		<link>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/</link>
					<comments>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 16 Jun 2012 03:51:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Drupal]]></category>
		<category><![CDATA[Joomla]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=299</guid>

					<description><![CDATA[Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png"><img loading="lazy" decoding="async" class="alignleft size-medium wp-image-361" title="mysql" src="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png" alt="" width="300" height="155" srcset="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png 300w, https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png 489w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>Security researchers have released details about a <a title="MySQL vulnerability allows attackers to bypass password verification" href="http://www.computerworld.com/s/article/9227965/MySQL_vulnerability_allows_attackers_to_bypass_password_verification" target="_blank">vulnerability in the MySQL server</a> that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.</p>
<p>The vulnerability occurs only on *NIX based systems and Microsoft Windows systems are not affected by this vulnerability.</p>
<p><span id="more-299"></span>No official patch is available for MySQL 5.0.x, because that version of thedatabase server is no longer supported by Oracle. However, some Linux vendors might backport the patch from MySQL 5.1 or 5.5. This also affects people with personal blogs on private Linux hosts that use MySQL back-ends for web applications such as WordPress, Joomla and Drupal.</p>
<p>Any Internet accessible MySQL database is extremely vulnerable, and those in <a title="Expect A Surge In Breaches Following MySQL Vulnerability" href="http://www.darkreading.com/database-security/167901020/security/vulnerabilities/240001958/expect-a-surge-in-breaches-following-mysql-vulnerability.html" target="_blank">security circles are warning of a wave of attacks</a>. To reduce the risk, configure your MySQL databases to accept connections from only authorised IP addresses and try not to allow any public IPs access to the databases.</p>
<p>Original article: <a href="https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/" rel="bookmark" title="Permanent link to 'MySQL Vulnerability Allows Attackers to Bypass Password Verification'">MySQL Vulnerability Allows Attackers to Bypass Password Verification</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">299</post-id>	</item>
		<item>
		<title>CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks</title>
		<link>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/</link>
					<comments>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 16 Jun 2012 02:31:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Advanced Micro Devices]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[CERT-US]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=292</guid>

					<description><![CDATA[The US Computer Emergency Response Team (US-CERT) has advised that some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT.png"><img loading="lazy" decoding="async" class="alignleft size-medium wp-image-363" title="US-CERT" src="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT-300x82.png" alt="" width="300" height="82" srcset="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT-300x82.png 300w, https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT.png 691w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>The <a title="United States Computer Emergency Readiness Team" href="http://www.us-cert.gov/" target="_blank">US Computer Emergency Response Team (US-CERT)</a> has advised that <a title="SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware" href="http://www.kb.cert.org/vuls/id/649219" target="_blank">some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable</a> to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.</p>
<p>The vulnerability is identified as CVE-2012-0217 and stems from the way Intel 64 CPUs have implemented the SYSRET instruction. The vulnerability can only be exploited on Intel CPUs when the Intel 64 extension is in use, that is, using a 64-bit OS; 32-bit OSes are not affected.</p>
<p><span id="more-292"></span>AMD does not implement the SYSRET instruction the same way and is not similarly affected. However, systems running on AMD64 chips may lock up under an attack and may therefore pose a Denial of Service (DoS) vulnerability.</p>
<p>A list of vendors and their vulnerability status is shown below. Note that this list may not be updated and you should check the CERT-US website for updates.</p>
<table id="vendor-info2" border="1px">
<tbody>
<tr>
<th width="120px">Vendor</th>
<th width="80px">Status</th>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MORO-8V9FNG" data-bitly-type="bitly_hover_card">Citrix</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPPR" data-bitly-type="bitly_hover_card">FreeBSD Project</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ2" data-bitly-type="bitly_hover_card">Intel Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MORO-8V9FQC" data-bitly-type="bitly_hover_card">Joyent</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ5" data-bitly-type="bitly_hover_card">Microsoft Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ8" data-bitly-type="bitly_hover_card">NetBSD</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQB" data-bitly-type="bitly_hover_card">Oracle Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQE" data-bitly-type="bitly_hover_card">Red Hat, Inc.</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWHYB" data-bitly-type="bitly_hover_card">SUSE Linux</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWQ9S" data-bitly-type="bitly_hover_card">Xen</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/JALR-8V8LFS" data-bitly-type="bitly_hover_card">AMD</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPPN" data-bitly-type="bitly_hover_card">Apple Inc.</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQL" data-bitly-type="bitly_hover_card">VMware</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWHXX" data-bitly-type="bitly_hover_card">Debian GNU/Linux</a></td>
<td>Unknown</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWPX7" data-bitly-type="bitly_hover_card">Fedora Project</a></td>
<td>Unknown</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>Interxect Services advises customers to update your systems with vendor approved patches as they become available.</p>
<p>Original article: <a href="https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/" rel="bookmark" title="Permanent link to 'CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks'">CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">292</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 36/50 queries in 0.016 seconds using Disk

Served from: www.interxect.com @ 2025-06-13 08:04:28 by W3 Total Cache
-->