US-CERT and other organizations Friday warned of a zero-day memory corruption bug in several versions of Microsoft Windows that could allow a remote attacker to cause a vulnerable system to crash and ...
CVE-2026-32202 actively exploited after April 27 advisory fix, exposing NTLMv2 hashes via zero-click SMB authentication.
The U.S. Cybersecurity and Infrastructure Agency has issued a warning relating to an actively targeted Microsoft Windows vulnerability that can be found in unpatched versions of Windows 10, Windows 11 ...
Microsoft announced that the Windows 11 SMB server is now better protected against brute-force attacks with the release of the Insider Preview Build 25206 to the Dev Channel. Redmond has enabled the ...
A security researcher unveiled a new unpatched bug in Windows 7 and Server 2008 R2 that, when exploited, locks up the system, requiring a total shutdown to regain control. A day after Microsoft ...
The dangerous NSA-developed EternalBlue exploit against a vulnerability in Microsoft's Server Message Block (SMB) protocol continues to pose a significant threat to many organizations worldwide more ...
It was a notable accomplishment when Windows 7 was not impacted in any way by the vulnerabilities addressed in the six Security Bulletins released by Microsoft for the November Patch Tuesday. It would ...
While not quite a patch, Microsoft updated its security advisory by telling users to cut support for the SMBv2 protocol, accompanied by a link to the Microsoft "Fix It" package disabling the SMBv2 ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results