• Some users have recently had their accounts hijacked. It seems that the now defunct EVGA forums might have compromised your password there and seems many are using the same PW here. We would suggest you UPDATE YOUR PASSWORD and TURN ON 2FA for your account here to further secure it. None of the compromised accounts had 2FA turned on.
    Once you have enabled 2FA, your account will be updated soon to show a badge, letting other members know that you use 2FA to protect your account. This should be beneficial for everyone that uses FSFT.

Critical VMWare Security Advisory VMSA-2017-0004.3

Zarathustra[H]

Extremely [H]
Joined
Oct 29, 2000
Messages
41,054
If you use VMWare's DaaS, vCenter, vROps or Hyperic, right about now would be a good time to apply the latest patch for VMware Security Advisory VMSA-2017-0004.3, which allows for remote code execution and complete system compromise. Personally I wouldn't want to leave vCenter 6.0 or 6.5 unpatched right now.

"As you can see, the vulnerability hits some of VMware’s most popular virtualization and virtual desktop products. Remote code execution vulnerabilities are generally must-patch issues as they can enable malicious parties to remotely take over and control a server."
 
I'm sure my head VM architect guy will be thrilled. It's hard enough to get current patches applied due to outage windows etc.

Yay, for once being behind the curve has advantages!

Procrastination always pays off in the end. Or maybe the week after. :)
 
Back
Top