Software

Patch Tuesday again

This month Microsoft released six security bulletins, three of them rated Critical, three of them rated Important.

The three Critical bulletins are:

1. Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution (961371)
2. Vulnerabilities in Microsoft DirectShow Could Allow Remote Code Execution (971633)
3. Cumulative Security Update of ActiveX Kill Bits (973346)

The three Important bulletins are:

1. Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege (969856)
2. Vulnerability in Microsoft ISA Server 2006 Could Cause Elevation of Privilege (970953)
3. Vulnerability in Microsoft Office Publisher Could Allow Remote Code Execution (969516)

You can find more information here on the Microsoft site.

Here’s a summary of the patches released so far in 2009:

Critical Important Moderate
January 1
February 2 2
March 1 2
April 5 2
May 1
June 6 3 1
July 3 3 1

Patched security vulnerabilities 2009

The use of unpatched vulnerabilities continues to be a significant part of the threat landscape, so it’s important to make sure you patch your systems. Remember you can use Windows Automatic Updates to automate this process.

Patch Tuesday again

Your email address will not be published. Required fields are marked *

 

Reports

Lyceum group reborn

According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the group’s activity, focused on two entities in Tunisia.

GhostEmperor: From ProxyLogon to kernel mode

While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the cluster GhostEmperor.

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

Subscribe to our weekly e-mails

The hottest research right in your inbox