Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Microsoft Patches 4 Zero-Day Vulnerabilities In September Patch Tuesday
Facebook   X   LinkedIn   Email

Microsoft Patches 4 Zero-Day Vulnerabilities In September Patch Tuesday

September 24, 2024

In Patch Tuesday in September 2024, Microsoft released fixes for 79 issues, including patches four actively exploited zero-day vulnerabilities affecting multiple Windows components. These vulnerabilities have serious security implications for administrators and users alike. Below are short summaries of the issues and what to do.

CVE-2024-38014 (Windows Installer Elevation of Privilege): This flaw allows attackers to gain system level privileges, making it easier to execute malicious code. The attacker could take complete control of affected systems without user interaction. Microsoft has not released any information thus far on how it’s being used for zero-day attacks.

CVE-2024-38226 (Microsoft Publisher Macro Policy Bypass): This vulnerability allows attackers to bypass Microsoft Office macro restrictions by tricking users into opening malicious files. Macros are a known vector for malware, so bypassing macro policies can lead to remote attacks on systems where Publisher is installed?.

CVE-2024-38217 (Windows Mark of the Web Security Bypass): This vulnerability, publicly disclosed before patching, enables attackers to bypass security warnings for downloaded files by manipulating the Mark of the Web feature. This exposes users to phishing and malware attacks, as Microsoft’s Smart App Control ssecurity prompts can be easily circumvented.

CVE-2024-43491 (Windows Update Remote Code Execution): This critical flaw affects older versions of Windows, allowing attackers to execute code remotely by exploiting issues with Windows Update. The vulnerability can undo previously applied security fixes, making systems vulnerable again?.

To mitigate risks, users should install the latest patches immediately. In fact, if it makes sense to do so, click on the automatic update feature. Administrators are encouraged to disable macros from unknown sources and users are encouraged never to enable macros by default. In fact, if you don’t know who created the macros, it’s always safer not to allow them.

As always, ensure anti-virus/anti-malware software is installed and kept updated at all times. While it won’t protect any system 100%, it lessens the chances something will get through that no one wants on their device.

Just a reminder that a zero-day exploit is one for which it’s known, but for which there is no fix. These are particularly dangerous since attackers often jump on those opportunities to take advantage of victims. Patching immediately reduces the risk they will find your system’s vulnerabilities before you have a chance to block them.


Attackers Target Neglected Websites to Go Phishing

Scams & Phishing

Attackers Target Neglected Websites to Go Phishing

According to a recent study by Kaspersky, there is a growing trend of attackers focusing on abandoned and minimally maintained websites for the purpose of hosting very legitimate-looking phishing pages. In fact, the research revealed a significant volume of compromised websites. Between mid-May and the end of July, it identified 22,400 distinct WordPress websites that had been compromised by threat actors to serve as platforms for hosting phishing pages. READ FULL STORY

Your Data For Sale On The Dark Web And What You Can Do About It

Identity Theft

Your Data For Sale On The Dark Web And What You Can Do About It

As much as we love the convenience of our digital world, we know a hefty price tag can come with it. The world is full of bad actors whose goal is to get their hands on our sensitive, personally identifiable information, or PII. Should you find your PII is for sale on the dark web, it helps to know there are options for doing something about it, even if you think it’s too late. Just some of that hijacked PII can include passwords, email and physical addresses, Social Security numbers, financial accounts, and much more. READ FULL STORY

Email Identity Crisis! Top Brands For Email Phishing And How To Tell The Difference

Scams & Phishing

Email Identity Crisis! Top Brands For Email Phishing And How To Tell The Difference

Some say impersonation is the greatest form of flattery, but it this case, it’s all about email phishing. Cybercriminals use some companies more than others because they’re well-known globally and have better odds for success. According to APWG’s Phishing Activity Trends Report, the U.S. saw over one million email phishing attacks in the first quarter of this year alone, the highest total on record so far. A look at who these companies are and how to avoid email phishing in their name benefits us all. READ FULL STORY

New Windows 11 Phishing Feature Adds Password Protection

Corporate Security

New Windows 11 Phishing Feature Adds Password Protection

As part of an effort to thwart phishing, Microsoft upped another level of user protection with its latest Windows 11 feature. It’s called Enhanced Phishing Protection and is a welcome sign that Microsoft is willing to take on the phishing threats to passwords their users face every day at home and at work. This latest feature adds a layer of password protection to Windows OS 11 22H2. You can help avoid phishing by looking for a few basic red flags. READ FULL STORY

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Corporate Security

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Sometimes we hear about an exploit that could cause potential harm to an individual or company and push it aside and perhaps briefly wonder if it ever actually did cause harm. If you have been paying attention to the technology news at all in the past weeks, you will know that they do indeed get exploited. One group is really busy and has made headlines a few times lately. In fact, every day there is a new story about an organization that has been attacked using the MOVEit zero-day. But no doubt, the other vulnerabilities are being abused too. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...