Original release date: October 1, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques.
In light of heightened tensions between the United States and...
Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user either visits a specially crafted website or...
administrative
code execution
critical
december 2016
graphics component
microsoft
ms16-146
patch
remote code execution
revision note
security bulletin
security risks
security update
softwarevulnerability
system security
update
user rights
vulnerability
windows
Revision Note: V1.0 (November 30, 2015): Advisory published.
Summary: Microsoft is aware of unconstrained digital certificates from Dell Inc. for which the private keys were inadvertently disclosed. One of these unconstrained certificates could be used to issue other certificates, impersonate...
Severity Rating: Important
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to...
bug fix
command line
exploitation
information disclosure
internet explorer
microsoft office
ms15-088
notepad
office updates
patch
powerpoint
revision note
risk mitigation
security
software security
softwarevulnerability
technical bulletin
update
vulnerability
windows
Today, Microsoft is pleased to announce the private preview of Link Removed, a security and threat information exchange platform for analysts and researchers working in cybersecurity. Interflow uses industry specifications to create an automated, machine-readable feed of threat and security...