<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Kaspersky reports new security exploit in Microsoft Windows OS

        Source: Xinhua| 2018-10-11 04:10:32|Editor: yan
        Video PlayerClose

        SAN FRANCISCO, Oct. 10 (Xinhua) -- Cyber-security firm Kaspersky Lab said Wednesday that Microsoft has fixed a zero-day exploit that it discovered in August, which could affect the Microsoft Windows operating system, including the latest Windows 10.

        Kaspersky said its security team found the zero-day vulnerability in the Win32k component of MS Windows operating system, which could be used by hackers to gain access to victim system, and it has notified Microsoft of the threat.

        "The exploit was executed by the first stage of a malware installer to get necessary privileges for persistence on the victim's system. The code of the exploit is of high quality and written with the aim of reliably exploiting as many different MS Windows builds as possible, including MS Windows 10 RS4," Kaspersky said in a security analysis report.

        The Moscow-based cyber-security firm reported a very limited number of attacks using this vulnerability, saying the victims are located in the Middle East.

        The vulnerability was delivered via a PowerShell backdoor, which has exclusively been used by the FruityArmor group in the past. The cyber-espionage group has been active since 2016 and targeting various organizations in the Mideast region.

        Microsoft fixed the bug in a series of security patch updates released on Tuesday, which classified it as an "important" severity marking, the Kaspersky said.

        "An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft wrote in an advisory about security update.

        The update addresses this vulnerability by correcting how Win32k handles objects in memory of MS Windows operating system.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011105521375239321
        主站蜘蛛池模板: 欧美大bbbb流白水| 亚洲码和欧洲码一二三四| 国产精品免费激情视频| 亚洲国产精品一区第二页| 强奷白丝美女在线观看| 免费看视频的网站| 蜜桃在线一区二区三区| 亚洲最大成人免费av| 亚洲男女羞羞无遮挡久久丫| 夜夜躁狠狠躁日日躁2021| 国产福利深夜在线播放| 91精品国产综合久久精品| 国产精品熟女一区二区不卡| 综合色区亚洲熟女妇p| 国产va免费精品观看| 日亚韩在线无码一区二区三区| 国产精品视频午夜福利| 欧美人在线一区二区三区| 宅男噜噜噜66在线观看| 极品少妇的诱惑| 亚洲国产中文在线有精品| 成人免费A级毛片无码片2022| 国产精品老熟女露脸视频| 亚洲免费视频一区二区三区 | 日本变态网址中国字幕| 日本高清中文字幕免费一区二区| 欧美产精品一线二线三线| 性奴sm虐辱暴力视频网站| 国产精品一精品二精品三| 少妇人妻偷人免费观看| 日韩乱码人妻无码中文字幕| 国产亚洲人成网站在线观看| 东方四虎av在线观看| 国产一区二区三区在线影院| 中文字幕人妻av第一区| 国产亚洲成AV人片在线观看导航| 国产精品呻吟一区二区三区| 欧美日韩一线| 自拍偷自拍亚洲精品播放| 农村老熟妇乱子伦视频| 国产亚洲久久久久久久|