Skip to content

Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April “5 Tips for Creating an Effective Online Presence” “How to Build an Engaging Digital Presence”

Microsoft recently disclosed that a Russian-based Advanced Persistent Threat (APT) actor had been exploiting a critical zero-day vulnerability in Outlook since April 2022. The vulnerability, tracked as CVE-2023-23397, leaves few forensic artifacts to discover in traditional endpoint forensic analysis and could be used for initial access, credential access, lateral movement, and persistence in compromised mailboxes.… 

The price of fast fashion (and feature creep) [Audio + Text] – Naked Security

The fashion industry is a major contributor to the global economy, but the cost of fast fashion is often overlooked. In this episode of the Naked Security podcast, Paul Ducklin and Chester Wisniewski discuss the high price of fast fashion and feature creep. They look at the issues of data privacy, malware risks, and the… 

Microsoft fixes two 0-days on Patch Tuesday – update now! – Naked Security

Thanks to the precise four-week length of February this year, last month’s coincidence of Firefox and Microsoft updates has happened once again. Last month, Microsoft dealt with three zero-days, by which we mean security holes that cybercriminals found first, and figured out how to abuse in real-life attacks before any patches were available. (The name… 

Microsoft Warns of Outlook Zero-Day Exploitation, Patches 80 Security Vulns “Surprising Secrets to Help You Lose Weight: Uncover the Truth Now!”

Microsoft on Tuesday released a large batch of software security updates, including two previously exploited zero-days for Windows OS users. The first, CVE-2023-23397, is a critical-severity issue in Microsoft Outlook. Microsoft warned that an attacker could exploit this vulnerability by sending a specially crafted email which automatically triggers when it is retrieved, leading to a…