0patch Blog

Security Patching Simplified To The Extreme

Thursday, January 7, 2021

Local Privilege Escalation 0day in PsExec Gets a Micropatch

›
    by Mitja Kolsek, the 0patch Team Last month, security researcher David Wells of Tenable published an analysis of a local privilege es...
2 comments:
Wednesday, December 23, 2020

Micropatch is Available for WSUS Spoofing Local Privilege Escalation Vulnerability (CVE-2020-1013)

›
  by Mitja Kolsek, the 0patch Team Windows 7 and Server 2008 R2 users without Extended Security Updates have just received a micropatch for...
Tuesday, December 15, 2020

2021 New Year's Resolution: "We Will Spend Less Time and Money on Security Patches"

›
  It's been over a year since we had announced our "security adoption" of Windows 7 and Windows Server 2008 R2 after they wou...
Wednesday, November 25, 2020

0day in Windows 7 and Server 2008 R2 Gets a Micropatch

›
  by Mitja Kolsek, the 0patch Team     "Lol, who's even using Windows 7 anymore?" "According to NetMarketShare , almost ...
4 comments:
Thursday, November 5, 2020

0patch Keeps Office 2010 Secured After End-Of-Support

›
by Mitja Kolsek, the 0patch Team [Update Jan 13, 2020: Microsoft issued further updates for Office 2010 in January 2021. We have updated th...
Thursday, September 17, 2020

Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472)

›
    by Mitja Kolsek, the 0patch Team     The Zerologon vulnerability allows an attacker with network access to a Windows Domain Controller...
Tuesday, August 11, 2020

Micropatch is Available for Windows Task Scheduler Security Feature Bypass (CVE-2020-1113)

›
by Mitja Kolsek, the 0patch Team Windows 7 and Server 2008 R2 users without Extended Security Updates have just received a mi...
›
Home
View web version
Powered by Blogger.