0patch Blog
Security Patching Simplified To The Extreme
Friday, February 21, 2020
Our First Weeks of Securing Windows 7 and Windows Server 2008 R2
›
A quick status update by Mitja Kolsek, the 0patch Team [Update 2/22/2020: More details on the exploit code for CVE-2020-0674 were publis...
Monday, February 10, 2020
Letter To 0patch Users (February 10, 2020)
›
Subject: 0patch - What you need to know about Windows 7 and Windows Server 2008 R2 security micropatches Dear 0patch user, Thank you for...
Tuesday, January 21, 2020
Micropatching a Workaround for CVE-2020-0674
›
A Kill Switch for Vulnerable jscript.dll by Mitja Kolsek, the 0patch Team Last Friday, Microsoft published an advisory about a r...
2 comments:
Monday, January 6, 2020
0patch Central: We are Now Ready to Micropatch Your Enterprise
›
0patch Central, our central management solution, is now ready to accept first users by Stanka Salamun, the 0patch Team At 0pat...
2 comments:
Friday, September 20, 2019
Micropatching Keeps Windows 7 and Windows Server 2008 R2 Secure After Their End-Of-Support
›
Becoming an Adoptive Parent For Abandoned Windows by Mitja Kolsek, the 0patch Team Hello people, it's nice to step out for a mom...
24 comments:
Tuesday, June 4, 2019
Another Task Scheduler 0day, Another Task Scheduler Micropatch (The SandboxEscaper Saga)
›
Backward Compatibility is Hard, and so is Stacked Impersonation by Simon Raner and Mitja Kolsek, the 0patch Team [Update 6/12/201...
Wednesday, April 17, 2019
Microsoft Edge Uses a Secret Trick And Breaks Internet Explorer's Security
›
Edge Decided To Use An Undocumented Security Feature. Internet Explorer Didn't Get The Memo. by Mitja Kolsek, the 0patch Team ...
‹
›
Home
View web version