Remove vulnerabilities-threats microsoft-patches-120-vulnerabilities-two-zero-days
article thumbnail

Microsoft Patch Tuesday, April 2022 Edition

Krebs on Security

Microsoft on Tuesday released updates to fix roughly 120 security vulnerabilities in its Windows operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and one is already seeing active exploitation, according to a report from the U.S. National Security Agency (NSA).

DNS 256
article thumbnail

Microsoft August 2020 Patch Tuesday fixed actively exploited zero-days

Security Affairs

Microsoft August 2020 Patch Tuesday updates addressed 120 vulnerabilities, including two zero-days that have been exploited in attacks. Microsoft August 2020 Patch Tuesday updates have addressed 120 flaws, including two zero-day vulnerabilities that have been exploited in attacks in the wild.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Actively exploited CVE-2020-1464 Windows Spoofing flaw was known since 2018

Security Affairs

The actively exploited Windows spoofing vulnerability (CVE-2020-1464) recently patched by Microsoft has been known for more than two years. The actively exploited Windows spoofing flaw, tracked as CVE-2020-1464 and patched last week by Microsoft, has been known for more than two years, researchers revealed.

article thumbnail

Security Affairs newsletter Round 286

Security Affairs

million users due to critical vulnerability Nefilim ransomware gang published Luxottica data on its leak site NSA details top 25 flaws exploited by China-linked hackers Pay it safe: Group-IB aids Paxful in repelling a series of web-bot attacks U.S. Every week the best security articles from Security Affairs free for you in your email box.

article thumbnail

GhostEmperor: From ProxyLogon to kernel mode

SecureList

With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the underlying cluster GhostEmperor. This means that the attackers likely abused vulnerabilities in the web applications running on those systems, allowing them to drop and execute their files.

Malware 127