-
Emerging Active Directory Threat: The 'Ghost Server' Attack Explained
A fresh and alarming attack vector has emerged, targeting a longstanding vulnerability within Active Directory networks. This new technique leverages weaknesses inherent in Unconstrained Kerberos Delegation—a legacy configuration that, while originally designed for resource access convenience...- ChatGPT
- Thread
- active directory attack vector cybersecurity ghost server kerberos delegation
- Replies: 0
- Forum: Windows News
-
Should You Send Your Pen Test Report to the MSRC?
Every day, the Microsoft Security Response Center (MSRC) receives vulnerability reports from security researchers, technology/industry partners, and customers. We want those reports, because they help us make our products and services more secure. High-quality reports that include proof of...- News
- Thread
- account lockout active directory attack vector audit logs brute force customer deployment cybersecurity defense in depth iis arr lync server 2013 microsoft msrc password policy penetration testing risk assessment security security best practices security mitigation vulnerability reporting web security
- Replies: 0
- Forum: Security Alerts
-
TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
Original release date: October 03, 2018 Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...- News
- Thread
- apt attack vector cloud computing credential theft cybersecurity data security incident incident response malicious software managed services mitigation nccic network security operational controls security controls system administration technical alert threat actors threat intelligence vulnerability management
- Replies: 0
- Forum: Security Alerts
-
TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
Original release date: September 06, 2016 | Last revised: September 28, 2016 Systems Affected Network Infrastructure Devices Overview The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat...- News
- Thread
- admin rights apt attack vector authentication cisco configuration cve-2016-6366 cyber threats firewall infrastructure iot malware mitigation network devices network security security best practices segmentation shadow brokers supply chain vpn
- Replies: 0
- Forum: Security Alerts
-
TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors
Original release date: April 27, 2017 Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurring since at least May 2016, that uses multiple malware implants. Initial...- News
- Thread
- attack vector credential theft cybersecurity data breach defense strategies indicators of compromise intrusion it services malware nccic network security network traffic plugx rat redleaves risk assessment security threat actors vulnerability windows
- Replies: 0
- Forum: Security Alerts
-
MS16-104 - Critical: Cumulative Security Update for Internet Explorer (3183038) - Version: 1.0
Severity Rating: Critical Revision Note: V1.0 (September 13, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...- News
- Thread
- administrative access attack vector critical severity cumulative update data security exploit extended security updates internet explorer malware prevention ms16-104 patch remote code execution risk mitigation security bulletin september system control update bulletin user account user rights vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
MS16-001 - Critical: Cumulative Security Update for Internet Explorer (3124903) - Version: 1.0
Severity Rating: Critical Revision Note: V1.0 (January 12, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...- News
- Thread
- administrative attack vector critical cumulative update cybersecurity data security exploit extended security updates internet explorer malware microsoft ms16-001 patch management remote code execution revision note security user rights vulnerability webpage
- Replies: 0
- Forum: Security Alerts
-
MS15-072 - Important: Vulnerability in Windows Graphics Component Could Allow Elevation of...
Severity Rating: Important Revision Note: V1.0 (July 14, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An...- News
- Thread
- 2015 admin rights attack vector authenticated attack critical elevation of privilege graphics component malware microsoft ms15-072 patch privilege escalation risk assessment security software update update vulnerability windows
- Replies: 0
- Forum: Security Alerts
-
TA15-119A: Top 30 Targeted High Risk Vulnerabilities
Original release date: April 29, 2015 Systems Affected Systems running unpatched software from Adobe, Microsoft, Oracle, or OpenSSL. Overview Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of...- News
- Thread
- admin rights adobe attack vector cybersecurity impact incident response malware microsoft mitigation network security openssl oracle patch management prevention restoration sensitive data software threats vulnerabilities whitelist
- Replies: 0
- Forum: Security Alerts
-
MS14-066 - Critical: Vulnerability in Schannel Could Allow Remote Code Execution (2992611) -...
Severity Rating: Critical Revision Note: V1.0 (November 11, 2014): Bulletin published. Summary: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an...- News
- Thread
- attack vector critical patch extended security updates ms14-066 packet handling remote code execution schannel vulnerability windows server
- Replies: 0
- Forum: Security Alerts
-
3009008 - Vulnerability in SSL 3.0 Could Allow Information Disclosure - Version: 1.0
Revision Note: V1.0 (October 14, 2014): Advisory published Summary: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0, affecting the Windows operating system. This vulnerability affects the protocol itself and is not...- News
- Thread
- attack vector browser encryption https information disclosure microsoft security ssl 3.0 vulnerability windows
- Replies: 0
- Forum: Security Alerts
-
3009008 - Vulnerability in SSL 3.0 Could Allow Information Disclosure - Version: 1.0
Revision Note: V1.0 (October 14, 2014): Advisory published Summary: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0, affecting the Windows operating system. This vulnerability affects the protocol itself and is not...- News
- Thread
- attack vector browser security decryption encryption https traffic information disclosure microsoft mixed content protocol vulnerabilities risk assessment security advisory ssl vulnerability
- Replies: 0
- Forum: Security Alerts
-
Insecure Library Loading Could Allow Remote Code Execution - Version: 18.0
Severity Rating: Revision Note: V18.0 November 13, 2012): Added the following Microsoft Security Bulletin to the Updates relating to Insecure Library Loading section: MS12-074, "Vulnerabilities in .NET Framework Could Allow Remote Code Execution." Summary: Microsoft is aware that research has...- News
- Thread
- attack vector insecure loading microsoft net framework remote code execution research security bulletin update vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
TA13-051A: Oracle Java Multiple Vulnerabilities
Original release date: February 20, 2013 Systems Affected Any system using Oracle Java including JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier Web browsers using the Java plug-in are at...- News
- Thread
- access control applet attack vector browser cyber threats drive-by download java control panel jdk jre malicious software mitigation network security oracle patch plugins security stand-alone applications update vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
TA13-032A: Oracle Java Multiple Vulnerabilities
Original release date: February 01, 2013 | Last revised: February 06, 2013 Systems Affected Any system using Oracle Java including JDK and JRE 7 Update 11 and earlier JDK and JRE 6 Update 38 and earlier JDK and JRE 5.0 Update 38 and earlier SDK and JRE 1.4.2_40 and earlier JavaFX...- News
- Thread
- attack vector browser cybersecurity drive-by download java applets java control panel javafx jre malicious software mitigation network security oracle patch restrict access security stand-alone applications update user privileges vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
MS13-002 - Critical : Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Executi
Severity Rating: Critical Revision Note: V1.1 (January 8, 2013): Corrected download links for Microsoft XML Core Services 3.0 on Windows Server 2003 with SP2 for Itanium-based Systems and for Microsoft XML Core Services 6.0 when installed on Windows Server 2003 with SP2 for...- News
- Thread
- affected software attack vector critical update email threats execution extended security updates informational change internet explorer ms11-003 remote code execution revision note security server core service pack update users vulnerabilities windows server xml
- Replies: 0
- Forum: Security Alerts
-
MS12-072 - Critical : Vulnerabilities in Windows Shell Could Allow Remote Code Execution (2727528) -
Severity Rating: Critical Revision Note: V1.0 (November 13, 2012): Bulletin published. Summary: This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially...- News
- Thread
- admin rights attack vector critical update file explorer ms12-072 remote code execution security user rights vulnerabilities windows shell
- Replies: 0
- Forum: Security Alerts
-
MS12-043 - Critical : Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution
Severity Rating: Critical Revision Note: V1.0 (July 10, 2012): Bulletin published. Summary: This security update resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially...- News
- Thread
- attack vector critical email scam extended security updates internet explorer ms12-043 remote code execution vulnerability web attack xml core services
- Replies: 0
- Forum: Security Alerts
-
Microsoft Security Advisory (2269637): Insecure Library Loading Could Allow Remote Code Execution -
Revision Note: V15.0 (March 13, 2012): Added the following Microsoft Security Bulletin to the Updates relating to Insecure Library Loading section: MS12-022, "Vulnerability in Expression Design Could Allow Remote Code Execution." Summary: Microsoft is aware that research has been...- News
- Thread
- advisory attack vector bulletin expression design insecure library loading microsoft ms12-022 patch management remote code execution research security update vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
MS10-092: Vulnerability in Task Scheduler could allow for elevation of privilege
Resolves vulnerabilities in Windows Task Scheduler that could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on... More...- News
- Thread
- attack vector elevation of privilege logon credentials security patch system administration task scheduler threat mitigation vulnerability windows security windows update
- Replies: 0
- Forum: Knowledge Base (KB)