logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks
  • Unknown actors deploy malware to steal data in occupied regions of Ukraine
  • Ransomware Attacks Double in Europe’s Transport Sector
  • BreachForums shuts down … but the RaidForums cybercrime universe will likely spawn a trilogy
  • Snipping Tool Windows 11: Bug exposes image content

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-27707 (dedecms) 16 March 2023
  • CVE-2023-27037 (qibocms) 16 March 2023
  • CVE-2021-31637 (uwamp) 16 March 2023
  • CVE-2023-26768 (liblouis) 16 March 2023
  • CVE-2023-26769 (liblouis) 16 March 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

The zero-day vulnerability in Windows PsExec gets a free micropatch

Posted on 8 January 2021

From en.secnews.gr

PsExec

A free micropatch that fixes a local scaling privilege (LPE) vulnerability in Microsoft’s Windows PsExec management tool is now available through the 0patch platform.

Read more…

Posted in News

Post navigation

Previous post: Google Speech-to-Text API Can Help Attackers Easily Bypass Google reCAPTCHA
Next post: ALERT: North Korean hackers targeting South Korea with RokRat Trojan
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.