2021 and into 2022 have seen continued innovation in the attack landscape as cybercriminals refine tactics and tools to evade defenses. 2021 saw the highest year on record for zero-day exploits, increased firmware attacks and new tampering attacks targeting security agents. Microsoft and our...
Original release date: March 17, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
The Cybersecurity and Infrastructure Security Agency...
I am currently in the middle of testing a hack on a Windows 10 virtual machine via brute force attack. I successfully hacked into the Windows 10 (victim) machine via OpenSSH port which I opened myself
I have looked on Windows Event viewer and have noticed that it shows the attack attempts and...
attack analysis
attacks
brute force
cybersecurity
event log
event viewer
hacking techniques
impersonation
ip address
kali linux
logging
machine identification
networking
openssh
penetration testing
security monitoring
user information
virtual machine
windows 10
Microsoft has been investigating recent attacks by malicious actors using the Dopplepaymer ransomware. There is misleading information circulating about Microsoft Teams, along with references to RDP (BlueKeep), as ways in which this malware spreads. Our security research teams have investigated...
actors
attacks
bluekeep
cybersecurity
dopplepaymer
guidance
information
investigation
malware
microsoft
misleading
prevention
protection
ransomware
rdp
research
security
teams
threats
vulnerabilities
I have got a second computer in my house and was going to have it up as much as possible for a Minecraft server. Both PCs Win 10 Pro x64 1809. I installed from the windows store the remote desktop app and started noticing Kaspersky blocking some attacks. (attached picture, mid-Oct) I...
antivirus
attacks
compromise
computer issues
encryption
hacks
home server
internet security
kaspersky
malware
minecraft
reformat
remote desktop
rsa-2048
security
teamviewer
user concern
windows 10
In the organization’s second annual report, published Tuesday, Chief Executive Officer Ciaran Martin wrote he’s in “little doubt” the U.K. will be victim of a “Category One Attack” on critical national infrastructure in the future, highlighting Russia as one of the states most likely to launch...
Original release date: January 04, 2018
Systems Affected
CPU hardware implementations
Overview
On January 3, 2018, the National Cybersecurity and Communications Integration Center (NCCIC) became aware of a set of security vulnerabilities—known as Meltdown and Spectre— that affect modern...
Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
account management
administrative rights
attacks
bulletin
control
critical
cumulative
data protection
december 2016
exploit
internet explorer
ms16-144
remote code execution
revision note
security
update
user rights
vulnerabilities
webpage
Revision Note: V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping.
Summary...
Revision Note: V1.0 (January 12, 2016): Advisory published.
Summary: Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy no longer allows root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of...
Revision Note: V1.0 (January 12, 2016): Advisory published.
Summary: Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy no longer allows root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of...
Today, Microsoft is announcing the end-of-support of the RC4 cipher in Microsoft Edge and Internet Explorer 11. Starting in early 2016, the RC4 cipher will be disabled by-default and will not be used during TLS fallback negotiations.
There is consensus across the industry that RC4 is no longer...
attacks
cipher
cryptography
edge
encryption
end of support
fallback
industry consensus
internet explorer
microsoft
rc4
security
security advisory
support
tls
user advice
web browsers
windows 10
windows 7
windows 8.1
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Secure Channel (Schannel) allows the use of a weak Diffie-Hellman ephemeral...
attacks
bit length
bulletin
configuration
dhe
diffie-hellman
encryption
information disclosure
key exchange
microsoft
minimum key length
revision note
schannel
security
server
severity rating
tls
update
vulnerability
windows
Severity Rating: Important
Revision Note: V1.1 (March 5, 2015): Advisory revised to clarify the reason why no workaround exists for systems running Windows Server 2003. See the Advisory FAQ for more information.
Summary: Microsoft is aware of a security feature bypass vulnerability in Secure...
Original release date: September 25, 2014
Systems Affected
GNU Bash through 4.3.
Linux, BSD, and UNIX distributions including but not limited to:
CentOS 5 through 7
Debian
Mac OS X
Red Hat Enterprise Linux 4 through 7
Link Removed 10.04 LTS, 12.04 LTS, and 14.04 LTS
Overview
A critical...
apache
arbitrary code
attacks
bash
command execution
cve-2014-6271
debian
environment variables
impact
linux
mac os x
openssh
patch
red hat
remote execution
security
shellshock
solution
unix
vulnerability
Severity Rating: Important
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves two privately reported vulnerabilities in Microsoft SQL Server (one in SQL Server Master Data Services and the other in the SQL Server relational database management...
attacks
bulletin
client-side
crafted websites
data services
database
email security
internet explorer
malware
management system
microsoft
phishing
privilege escalation
revision note
security
sql server
update
user actions
vulnerabilities
web security
Original release date: January 17, 2014 | Last revised: March 07, 2014
Systems Affected
Certain UDP protocols have been identified as potential attack vectors:
DNS
NTP
SNMPv2
NetBIOS
SSDP
CharGEN
QOTD
BitTorrent
Kad
Quake Network Protocol
Steam Protocol
Overview
A Distributed Reflective...
Today, we are updating the Certificate Trust List (CTL) for all supported releases of Microsoft Windows to remove the trust of mis-issued third-party digital certificates. These certificates could be used to spoof content and perform phishing or man-in-the-middle attacks against web properties...
Severity Rating:
Revision Note: V1.1 (July 3, 2013): Clarified that disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. This is an informational change only.
Summary: Microsoft is announcing the availability of...