GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Sunday, 03-Mar-2024 01:30:07 JST Kevin Beaumont Kevin Beaumont

    Another clanger from Microsoft -

    - zero day vulnerability being exploited in Windows OS for six months in the wild by North Korea

    - They didn’t tell anybody, took six months to make a patch

    - released the patch without saying what happened

    - didn’t mark it as a zero day in Microsoft Vulnerability Management

    You’d think having the largest market cap in the world and having $2bn a year in revenue from security alone would allow.. uh.. investment.

    https://www.bleepingcomputer.com/news/security/windows-kernel-bug-fixed-last-month-exploited-as-zero-day-since-august/

    In conversation about a year ago from cyberplace.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Windows Kernel bug fixed last month exploited as zero-day since August
      from @BleepinComputer
      Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day.
    • Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Jim - webcomic (stupidjim@mastodon.social)'s status on Sunday, 03-Mar-2024 03:55:48 JST Jim - webcomic Jim - webcomic
      in reply to

      @GossiTheDog It's a corporation, what did you expect.

      Stop. using. corporate. services.

      In conversation about a year ago permalink
    • Embed this notice
      Jim - webcomic (stupidjim@mastodon.social)'s status on Sunday, 03-Mar-2024 04:42:10 JST Jim - webcomic Jim - webcomic

      @GossiTheDog Your choice, but you loose the right to complain when they frik up things again.

      In conversation about a year ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 05-Mar-2024 08:36:59 JST Kevin Beaumont Kevin Beaumont
      in reply to

      https://arstechnica.com/security/2024/03/hackers-exploited-windows-0-day-for-6-months-after-microsoft-knew-of-it/

      Ars has a good look at this one.

      My take - it may well have been a bunch of technical work to fix the vulnerability, absolutely. But Microsoft can afford to resource this stuff - it’s one of the most profitable companies on earth, and they end to end own and create 100% of the code.

      To again repeat one plea for vulnerability researches - publish public timelines on blogs about disclosures. It would create visibility of how long fixes take, and encourage accountability.

      In conversation about a year ago permalink

      Attachments


      1. Domain not in remote thumbnail source whitelist: cdn.arstechnica.net
        ars | Ars Technica
        Serving the Technologist for more than a decade. IT news, reviews, and analysis.
      2. VineBeat™
        from VineBeat
        VineBeat - We create and invent the future

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.