Security News > 2016 > May > Exploit kits are the greatest danger for Windows users (Help Net Security)
Exploit kits are how most malware gets on victims’ computers and, according to Microsoft, encounters with exploit kits increased by more than a third from 3Q15 to 4Q15. The second place on the list of exploits most commonly detected and blocked by Microsoft real-time antimalware products in 2H15 is the one for CVE-2010-2568, the Windows Shell Shortcut Icon Loading Vulnerability which was one of the four flaws used by the attackers who released the Stuxnet … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/46Mah_2RcLw/
Related news
- Microsoft plans to boot security vendors out of the Windows kernel (source)
- Microsoft announces new and improved Windows 11 security features (source)
- Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity (source)
- Security? We've heard of it: How Microsoft plans to better defend Windows (source)
- RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks (source)
- New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Critical security hole in Apache Struts under exploit (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-07-22 | CVE-2010-2568 | Unspecified vulnerability in Microsoft products Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems. | 7.8 |