LINK Essentially, the abuse of the old NTLM protocol is happening. Something that needs to be investigated for immediate retirement on your network.
LINK A serious elevation of privilege flaw found could allow a local attacker run their own code with sys privs. Read the article closely for the way this is resolved and to confirm if you are in fact vulnerable.
LINK I know I have missed one or two new PrintNightmare updates with NEW vulnerabilities. Its time if you have not to immediately disable the Print Spooler unless you absolutely need it. PERIOD.
LINK If you have Windows…we have an update for you.
LINK LINK MS Patched CVE-2021-1675 in the beginning of June however, the patch doesn’t fix the vulnerability on Windows Server 2019 it looks. This looks to be a nightmare coming and more will come out on this.
LINK 5 are rated critical, 45 important, 6 are currently under attack – time to get patching ready!
LINK – LINK Well, if your machines are vulnerable to this, you want to prioritize getting this patched asap.
LINK SentinalLabs identified a new vulnerability utilizing the Windows RPC Protocol to take advantage of NTLM.
LINK Just wanted to reminder everyone this is coming.