This is your one stop solution to all the notifications and alerts to keep your organisation IT Infrastructure safe from threats and vulnerabilities.
#PatchNOW
I have 5 years work experience as a vulnerability manager.
I will be providing everything an organization's security vulnerability manager needs in the form of a small card.
Just remember the following colour code for priority:
Maroon: Critical
Red: High
Blue: Informational
Microsoft Patch Tuesday July 2024
(Pic 1) List of KBs released corresponding to each OS
(Pic 2) List of Zero-days released(2 of them exploited in-the-wild already)
**Patch CVE-2024-38080 and CVE-2024-38112 NOW !!
#PatchTuesday
#Microsoft
#PatchNOW
#cybersecurity
#CyberSec
Update from Cisco regarding CVE-2024-6387 :
Cisco has identified the following products affected by this vulnerability.
1) Network and Content Security Devices
-Adaptive Security Appliance (ASA) Software
-Firepower Management Center (FMC) Software
-Firepower Threat Defense
Please note that CVE-2024-2885 affects chromium, which is used by many browswers like Microsoft edge,FreeBSD.. Hence it is recommended to patch these browsers as well.
CVE-2024-38080(Zero-day Exploited-in-the-wild):
CVE-2024-38112(Zero-day Exploited-in-the-wild):
CVE-2024-35264:
CVE-2024-37985:
List of Vulnerabilities addressed in Patch Tuesday
Information regarding the recent Microsoft Outage which included products like
Azure App Services,
Application Insights,
Azure IoT Central,
Azure Log Search Alerts,
Azure Policy,
Azure portal itself
and a subset of Microsoft 365
and Microsoft Purview.
#PatchNOW
4) Debian testing, unstable and experimental distributions versions 5.5.1alpha-0.1 to 5.6.1-1-
5) openSUSE Tumbleweed and openSUSE MicroOS-
6) Kali Linux-
CVE-2024-26169 : Windows Error Reporting Service Elevation of Privilege Vulnerability (May 20204 Update)..
IF YOU HAVEN'T PATCHED IT YET, PATCH IT NOW!! (or at-least check for this vulnerability in your systems).
#PatchNOW
#cybersecurity
#ZeroDay
#infosec
#informationsecurity