Vendors of most major operating systems and network hardware participated in the effort. Each vendor also released their own advisories and patches using their existing patch processes. The US CERT also played a major role in coordinating the release and advises all organizations to test the patches from the vendors and get them applied as soon as possible. While no known malicious activity exists as of the time of this writing, it is largely known that attackers are assembling the details that have been made public and are attempting to recreate the vulnerability and exploitation techniques that the initial researcher discovered.
Download the paper in PDF format here.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.