Security News > 2016 > May > Exploit kits are the greatest danger for Windows users (Help Net Security)
Exploit kits are how most malware gets on victims’ computers and, according to Microsoft, encounters with exploit kits increased by more than a third from 3Q15 to 4Q15. The second place on the list of exploits most commonly detected and blocked by Microsoft real-time antimalware products in 2H15 is the one for CVE-2010-2568, the Windows Shell Shortcut Icon Loading Vulnerability which was one of the four flaws used by the attackers who released the Stuxnet … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/46Mah_2RcLw/
Related news
- Windows 10 KB5043064 update released with 6 fixes, security updates (source)
- About that Windows Installer 'make me admin' security hole. Here's how it's exploited (source)
- Windows Server 2025 previews security updates without restarts (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Windows 10 KB5044273 update released with 9 fixes, security updates (source)
- OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf (source)
- Iranian hackers now exploit Windows flaw to elevate privileges (source)
- North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware (source)
- Exploit released for new Windows Server "WinReg" NTLM Relay attack (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-07-22 | CVE-2010-2568 | Unspecified vulnerability in Microsoft products Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems. | 7.8 |