An attacker is exploiting a Microsoft remote code execution vulnerability using malicious Office files. The tech giant has warned. so-called vulnerabilities CVE-2021-40444 It affects Windows Server versions 2008 and Windows 7 through 10. What an attacker is doing is sending potential Office files and tricking them into opening them. The file will automatically open Internet Explorer to load the malicious web page. It controls ActiveX that downloads malware onto victims' computers.
Investing in Online Slot Games It is a worthwhile investment for สล็อต เว็บตรงไม่ผ่านเอเย่นต์ those who want to earn the most right now. which many people may be wondering that Then we will use the money to invest in a good amount, so it will be appropriate and profitable from playing online slots well. If you want a great profit, deposit withdraw slots with lucky numbers, look!!
Several security researchers have reported zero-day attacks to Microsoft. One of them, Haifei Li from EXPMON told BleepingComputer. That the method is 100 percent reliable, all used in a local infestation was for the victim to open a malicious file. In Li's case, the attack they found was based on the .DOCX document. Microsoft has not released a security patch yet. safe for such vulnerabilities But mitigation methods have been published to prevent infection.
The tech giant says Microsoft Defender Antivirus and Microsoft Defender for Endpoint can detect vulnerabilities and prevent infection. Therefore, users need to keep it updated and active. It is also recommended to disable all ActiveX controls in Internet Explorer so that they are inactive for all websites. The Microsoft Security Warning contains information on how to proceed. This involves updating the IE registry and rebooting the computer.