Security News > 2016 > April > Microsoft patches Badlock, but doesn’t call it critical (Help Net Security)

Microsoft just released several security bulletins, with six marked as critical and seven categorized as important. The biggest surprise (or disguise) came in the patch marked only as important titled “Security Update for SAM and LSAD Remote Protocols” – this refers to the vulnerability more commonly known as Badlock. As it turns out Badlock was not directly part of an exploit in Server Message Block (SMB) as original anticipated but rather part of Microsoft authentication … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/7h9KkoT_zgs/
Related news
- Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API (source)
- The ongoing evolution of the CIS Critical Security Controls (source)
- 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update (source)
- ‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security (source)
- Microsoft: Outdated Exchange servers fail to auto-mitigate security bugs (source)
- Microsoft: January Windows security updates break audio playback (source)
- Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution (source)
- Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score (source)
- Critical RCE bug in Microsoft Outlook now exploited in attacks (source)
- Microsoft shares workaround for Windows security update issues (source)