Min menu

Pages

Latest [LastPost]

Microsoft addresses 83 security holes in the January update, most notably Zero Day in the Defender protection program.

Microsoft addresses 83 security holes in the January update, most notably Zero Day in the Defender protection program.

The American company "Microsoft", the software giant in the world, started today, Tuesday, the launch of its monthly security updates for the month of January, known in the information technology industry as the "Tuesday security patch."

Microsoft addresses 83 security holes in the January update, most notably Zero Day in the Defender protection program.


In this month's update, the company addressed a total of 83 security vulnerabilities across a wide range of products; Including its most popular operating system "Windows" and its cloud products, development tools and corporate server systems.


Of all the vulnerabilities addressed by today's update, the most important was the "zero day" bug that was discovered in the "Microsoft Defender" antivirus program, and which Microsoft said it discovered before the release of today's updates.


"Microsoft" indicated that "Defender Zero Day" is a security vulnerability that facilitates the remote execution of software code, which allowed hackers to execute code codes on compromised devices by tricking the user to open a document file booby trapped on the device on which the "Defender" program is installed.


In addition to the "Defender Zero Day" vulnerability, "Microsoft" has also addressed a security vulnerability in one of the "Windows" system services that can be used to raise the powers of executing software code developed by hackers. The vulnerability was discovered in the middle of last month by the "Zero Day Initiative" project sponsored by Trend Micro, a company specialized in information security solutions. "Microsoft" confirmed that this vulnerability has not been exploited by hackers so far.


The company called on the information systems managers to review today's security updates and implement them, and to avoid annoying problems in the event that these security vulnerabilities develop and are subject to the exploitation of system hackers.

Rate us :
Admin
Admin
Welcome to cairotimes24.com. We hope our topics satisfy your interest and admiration. Please do not forget to like our page on Facebook, our page on Twitter and on Pinterest to receive all new

Comments

Enter your email address:

Delivered by FeedBurner