GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Sunday, 03-Mar-2024 01:30:07 JSTKevin BeaumontKevin Beaumont

    Another clanger from Microsoft -

    - zero day vulnerability being exploited in Windows OS for six months in the wild by North Korea

    - They didn’t tell anybody, took six months to make a patch

    - released the patch without saying what happened

    - didn’t mark it as a zero day in Microsoft Vulnerability Management

    You’d think having the largest market cap in the world and having $2bn a year in revenue from security alone would allow.. uh.. investment.

    https://www.bleepingcomputer.com/news/security/windows-kernel-bug-fixed-last-month-exploited-as-zero-day-since-august/

    In conversationabout a year ago from cyberplace.socialpermalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Windows Kernel bug fixed last month exploited as zero-day since August
      from @BleepinComputer
      Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day.
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.