Today, as part of Update Tuesday, we released 8 security bulletins.
We encourage customers to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploitability Index (XI), visit the Microsoft Bulletin Summary webpage. If you...
Today, as part of Update Tuesday, we released 13 security bulletins.
We encourage customers to apply all of these updates. For more information about this month’s security updates, including a detailed view of the Exploitability Index (XI), visit the Microsoft Bulletin Summary webpage. If you...
Today, as part of Update Tuesday, we released 14 security bulletins to address vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Exchange, and Internet Explorer.
We encourage customers to apply all of these updates. For more information about this month’s security updates...
bulletins
common vulnerabilities
cve
exploitabilityindex
internet explorer
internet security
march 2015
microsoft office
microsoft windows
msrc
patch management
security
security advisory
security features
software updates
tech news
update tuesday
updates
vulnerabilities
Today, as part of Update Tuesday, we released nine security bulletins – three rated Critical and six rated Important in severity, to address 56 unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows, Microsoft Office, Internet Explorer, and Microsoft Server software.
We...
advisory
bulletins
change
critical
cve
exploitabilityindex
february 2015
important
internet explorer
microsoft office
microsoft server
microsoft windows
msrc
re-released
remote code execution
response center
security
ssl
updates
vulnerabilities
At the end of each year, some folks take a moment to jot down predictions about what the coming year has in store. I, on the other hand, do not do predictions. I am neither prognosticator, seer, fortune teller, prophet, clairvoyant, soothsayer, nor medium; although I have been accused of being a...
Happy holidays! I hope everyone is enjoying the festive season. I like to get my holiday shopping done early, and this year was no exception. In the middle of my holiday shopping last week, as I passed my cash from one store to the next, I was reminded of “Pass-the-Hash.” (My mind...
adobe flash
bulletin release
critical updates
cybersecurity
december 2012
deployment guidance
exploitabilityindex
holiday season
internet explorer
microsoft
microsoft word
pass-the-hash
patch management
remote code execution
rtf file
security update
technical advisory
trustworthy computing
vulnerabilities
webcast
asp.net
authentication
custom code
cve
denial of service
exchange 2010
exploitabilityindex
forms authentication
hashtables
iis
internet-facing
patching
security
server environment
technical guidance
update
vulnerability
web servers
windows server
windows update
Hello all. It has been very nearly a week since our Link Removed due to 404 Error at Black Hat. Now that everyone’s had some time to digest the basics, we’ve asked Senior Security Strategist and chief BlueHat Prize architect Katie Moussouris to stop by the Trustworthy Computing...
august 2011
bluehat prize
bulletins
community engagement
critical updates
customer guidance
deployment
dns server
exploitabilityindex
internet explorer
jerry bryant
microsoft
remote code execution
risk assessment
security bulletin
security updates
technet
trustworthy computing
vulnerabilities
webcast
Hello everyone,
Today we are announcing changes to Microsoft’s Link Removed
Since October 2008, we have used the Exploitability Index to provide customers with valuable exploitability analysis for our security bulletins, and starting Tuesday this information will become even more...
Hello all. As part of our usual cycle of monthly updates, todayMicrosoft is releasing three security bulletins, addressing 11 vulnerabilities.One of the bulletins has a Critical severity rating, while the other two arerated Important. Recapping the trio:
Link Removed due to 404 Error This...
Two years ago, in front of a standing-room only crowd here at Black Hat, we introduced three new information sharing programs as well as the concept of Community-Based Defense. The underlying concept shared by all three programs was simple-collaboration will be key to preventing and defending...