by Fortify Security Team | Nov 8, 2022 | Actively Exploited, Microsoft, Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Oct 11, 2022 | Actively Exploited, Microsoft, Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Sep 13, 2022 | Actively Exploited, Microsoft, Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Sep 2, 2022 | Industry News
Title: New Ransomware Hits Windows, Linux Servers of Chile Govt Agency Date Published: September 1, 2022 https://www.bleepingcomputer.com/news/security/new-ransomware-hits-windows-linux-servers-of-chile-govt-agency/ Excerpt: “Chile’s national computer security...
by Fortify Security Team | Aug 9, 2022 | Actively Exploited, Microsoft, Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...