Microsoft has released a security update for Malware Protection Engine, including a patch for the remote code execution vulnerability
Two critical vulnerabilities that could allow unprivileged remote attackers to launch DoS attacks against servers and change any other users’ passwords, including admin’s, were detected and addressed by maintainers of Samba.
Google Project Zero discovered a new security issue that was tested on Windows 10 Version 1709.
Cisco engineers found other attack vectors and features that are affected by CVE-2018-0101 vulnerability that were not originally identified by the NCC Group and subsequently updated the security advisory.
Vulnerability CVE-2017-3145 affects all versions of BIND since 9.9.0, released in 2000, and can lead to denial-of-service and crash.
Microsoft has added important note on the support page describing incompatibilities between antivirus (AV) products and the recent Windows Meltdown and Spectre patches.
Windows 7 and Windows 8 users running older processors will be most affected by performance issues.
Vulnerabilities affected vSphere Data Protection (VDP) and allowed authentication bypass, arbitrary file upload and path traversal.
In response to issues identified by external researchers, Intel performed a security review of Management Engine (ME), Server Platform Services (SPS) and Trusted Execution Engine (TXE) and identified several security vulnerabilities.
New attack dubbed “KnockKnock” because attackers “knock” on backdoor system accounts to infiltrate entire O365 environments.