22 Security Vulnerabilities Targeted by Microsoft on Tuesday Patch

This week Microsoft on Tuesday announced the release of its monthly patch, which fixes 22 security vulnerabilities found in Internet Explorer, Visio, Visual Studio and Windows. Of the releases, two are considered critical updates which should be applied immediately for Internet Explorer and Windows DNS Server.

This month's patch release is unusual in that it was released the Tuesday following the recent DEFCON conference in Las Vegas, rather than before the black hat event. As Aviv Raff, the CTO of Seculert, a cyber security management company, put it, "Usually, vendors patch for zero day before a security conference in order to block security researchers from releasing them."

This week Microsoft on Tuesday announced the release of its monthly patch, which fixes 22 security vulnerabilities found in Internet Explorer, Visio, Visual Studio and Windows. Of the releases, two are considered critical updates which should be applied immediately for Internet Explorer and Windows DNS Server.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand EventEvent Date: March 21, 2017 With the rise in ransomware attacks, bank heists that reached new levels of sophistication, and extortion plots that were beyond anything we could have imagined, 2016 certainly was an eventful year for cybersecurity. Going into 2017, no business can afford to be uninformed about cybersecurity or unprepared for an attack. Watch this informative webinar, presented by Andrey Pozhogin, Senior B2B Product Marketing Manager at Kaspersky Lab, as he examines predictions for …

  • As your content grows, it can be challenging to define the proper rules, regulations and policies that govern that content and ensure proper protection and compliance. Entrusting your content to Box – the only secure, modern content platform in the cloud – is the right first step. The next step is to evaluate your retention, disposition and defensible discovery needs and to establish the proper buy-in to satisfy all your needs. In this Information Governance webinar, learn how Box Governance can add …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date