Software

Patch Tuesday again

This month Microsoft released six security bulletins, three of them rated Critical, three of them rated Important.

The three Critical bulletins are:

1. Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution (961371)
2. Vulnerabilities in Microsoft DirectShow Could Allow Remote Code Execution (971633)
3. Cumulative Security Update of ActiveX Kill Bits (973346)

The three Important bulletins are:

1. Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege (969856)
2. Vulnerability in Microsoft ISA Server 2006 Could Cause Elevation of Privilege (970953)
3. Vulnerability in Microsoft Office Publisher Could Allow Remote Code Execution (969516)

You can find more information here on the Microsoft site.

Here’s a summary of the patches released so far in 2009:

Critical Important Moderate
January 1
February 2 2
March 1 2
April 5 2
May 1
June 6 3 1
July 3 3 1

Patched security vulnerabilities 2009

The use of unpatched vulnerabilities continues to be a significant part of the threat landscape, so it’s important to make sure you patch your systems. Remember you can use Windows Automatic Updates to automate this process.

Patch Tuesday again

Your email address will not be published.

 

Reports

The SessionManager IIS backdoor

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East.

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’.

WinDealer dealing on the side

We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack.

APT trends report Q1 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.

Subscribe to our weekly e-mails

The hottest research right in your inbox