{"id":667,"date":"2023-03-26T10:39:51","date_gmt":"2023-03-26T10:39:51","guid":{"rendered":"https:\/\/www.cyberwissen.net\/?p=145"},"modified":"2024-03-23T04:04:17","modified_gmt":"2024-03-23T04:04:17","slug":"critical-zero-day-vulnerability-allows-hackers-to-bypass-windows-defences","status":"publish","type":"post","link":"https:\/\/cyberwissen.io\/pt\/critical-zero-day-vulnerability-allows-hackers-to-bypass-windows-defences\/","title":{"rendered":"Hackers Exploit Critical Zero-Day Vulnerability to Bypass Windows Defences"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Update your operating system as soon as possible to protect your devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft&#8217;s latest Patch Tuesday release for March 2023 brings vital fixes, <\/span><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-march-2023-patch-tuesday-fixes-2-zero-days-83-flaws\/\"><span style=\"font-weight: 400;\">including nine critical vulnerabilities and 74 lower-severity issues.<\/span><\/a><span style=\"font-weight: 400;\"> Within this batch, two zero-day vulnerabilities demand your attention, as hackers have already initiated attacks leveraging them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first zero-day, labelled as CVE-2023-24880, presents a dangerous capability to bypass Windows&#8217; built-in defences against potentially harmful files sourced from the web. The consequence? Your operating system could become susceptible to malware infiltration, as its ability to recognise and thwart such threats is compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second zero-day pertains to Microsoft Outlook, a widely-used email client. This flaw enables attackers to masquerade as their victims and access sensitive, potentially confidential information. A cunningly crafted email, triggering an attack upon arrival in your inbox, can compromise your data \u2013 even if the email remains unopened.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To shield your devices from these imminent threats, we strongly urge you to promptly install the latest updates. Detailed instructions can be found on the <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/update-windows-3c5ae7fc-9fb6-9af1-1984-b5e0412c556a#WindowsVersion=Windows_11\"><span style=\"font-weight: 400;\">Microsoft Support page for Windows<\/span><\/a><span style=\"font-weight: 400;\">. Your swift action is a key step toward maintaining the integrity and security of your digital environment.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update your operating system as soon as possible to protect your devices. Microsoft&#8217;s latest Patch Tuesday release for March 2023 brings vital fixes, including nine critical vulnerabilities and 74 lower-severity issues. Within this batch, two zero-day vulnerabilities demand your attention, as hackers have already initiated attacks leveraging them. The first zero-day, labelled as CVE-2023-24880, presents [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":3022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-new-technology"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/comments?post=667"}],"version-history":[{"count":1,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/667\/revisions"}],"predecessor-version":[{"id":1989,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/667\/revisions\/1989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/3022"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/categories?post=667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/tags?post=667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}