Meltdown and Spectre present 3 different ways of attacking data protection measures on CPU's enabling attackers to read data they shouldn't be able to.
(Scott Manley does a great job of explaining this YouTube Link)
So what is Software vendors doing about this?
What impact does it have on Nintex Products.
What you need to do?
Nintex security patch notice: Security patching to address the "Meltdown" and "Spectre" - Nintex Knowledge Base
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.