Emergency Patch for Zero-Day Vulnerability in Internet Explorer

Microsoft has released an unscheduled patch for a remote code execution vulnerability in Internet Explorer that is actively exploited by attackers. Microsoft releases security updates on the second Tuesday of every month—known in the industry as Patch… Continue reading Emergency Patch for Zero-Day Vulnerability in Internet Explorer

Microsoft Issues Emergency Patch For Under-Attack IE Zero Day

Microsoft today issued an out-of-band security update to patch a critical zero-day vulnerability in Internet Explorer (IE) Web browser that attackers are already exploiting in the wild to hack into Windows computers.

Discovered by security researcher … Continue reading Microsoft Issues Emergency Patch For Under-Attack IE Zero Day

Chrome, Firefox, Edge and Safari Plans to Disable TLS 1.0 and 1.1 in 2020

All major web browsers, including Google Chrome, Apple Safari, Microsoft Edge, Internet Explorer, and Mozilla Firefox, altogether today announced to soon remove support for TLS 1.0 (20-year-old) and TLS 1.1 (12-year-old) communication encryption protoc… Continue reading Chrome, Firefox, Edge and Safari Plans to Disable TLS 1.0 and 1.1 in 2020

Update now! Microsoft fixes 49 bugs, 12 are critical

Microsoft’s October Patch Tuesday update made its scheduled appearance on Tuesday with fixes for 49 security flaws across its family of products, 12 of which are listed as ‘critical’. Continue reading Update now! Microsoft fixes 49 bugs, 12 are critical

Microsoft patches zero-day exploit against Internet Explorer

Researchers at Trend Micro recently discovered a high-risk zero-day exploit against the latest versions of Windows and Internet Explorer in malicious web traffic, the security firm announced on Wednesday. Microsoft issued patches this week. The vulnerability, dubbed CVE-2018-8373, is “a remote code execution vulnerability [that] exists in the way that the scripting engine handles objects in memory in Internet Explorer,” according to Microsoft. “The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user,” Microsoft said. The vulnerability is exploited by visiting a malicious web page or opening a malicious Microsoft Word document rendered with Internet Explorer. Internet Explorer is the second-most-popular web browser after Google Chrome. It’s also especially popular in enterprise environments, which means exploits can potentially be used to attack businesses and other large organizations. Trend Micro security researcher Elliot Cao is credited with discovery. […]

The post Microsoft patches zero-day exploit against Internet Explorer appeared first on Cyberscoop.

Continue reading Microsoft patches zero-day exploit against Internet Explorer

Microsoft Releases Patches for 60 Flaws—Two Under Active Attack

Get your update caps on.

Just a few minutes ago Microsoft released its latest monthly Patch Tuesday update for August 2018, patching a total of 60 vulnerabilities, of which 19 are rated as critical.

The updates patch flaws in Microsoft Windows, Edge … Continue reading Microsoft Releases Patches for 60 Flaws—Two Under Active Attack

What’s the alternative of content security policy (CSP) header in Internet Explorer IE?

As mentioned in the Content Security Policy documentation & from the “supported browsers” page on the CSP site, CSP is not supported in Internet Explorer.

So, if we want to support CSP in our application with all the sup… Continue reading What’s the alternative of content security policy (CSP) header in Internet Explorer IE?