Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Deciding between 0patch and Extended Security Updates for your Windows 7 and Server 2008 R2 computers? We'll give you a one-month free trial for your entire Windows fleet so you can test us. If you don't like what you get, you can still go with ESU. Email sales@0patch.compic.twitter.com/nDTCAOFrHp
-
The micropatch simply overrides Outlook's reading of WebView settings for determining whether Home Page is enabled, and makes Outlook believe the answer is "disabled" regardless of what the Registry says. This prevents the bypass. Source code contains just one instruction:pic.twitter.com/1G4OjnaqhJ
Prikaži ovu nit -
We issued a micropatch for CVE-2017-11774, a remote code execution vulnerability in Outlook that has been widely exploited and remains popular with attackers. In contrast to official patch which could be reverted by non-admins, micropatch will reliably disable Outlook Home Page.pic.twitter.com/3MW0l0PvuV
Prikaži ovu nit -
Video of micropatch in actionhttps://www.youtube.com/watch?v=ixpBN_a2cHQ&feature=youtu.be …
Prikaži ovu nit -
Micropatching a Workaround for CVE-2020-0674 https://blog.0patch.com/2020/01/micropatching-workaround-for-cve-2020.html …pic.twitter.com/QUphiwNFR3
Prikaži ovu nit -
Enterprises and governments still on Windows 7 and Server 2008 R2! We'll keep your computers security-patched up to 3 more years. No reboots, instantly apply and remove patches while users are working, central management. Contact sales@0patch.com https://0patch.com/#custom-area pic.twitter.com/3oYW90hROe
-
So you're keeping Windows 7 or Server 2008 R2? We know you have good reasons. And we'll be happy to help you keep them as secure as possible with our security micropatches. You can completely control them or go full "set and forget" with 0patch. See https://0patch.com/#custom-area pic.twitter.com/fW1TQIseaC
-
Existing and future 0patch users with Windows 7 and Windows Server 2008 R2! Make sure to apply today's (last) Windows Updates, preferably the Monthly Rollup which includes all previous fixes. This will prepare your computer for three years of post-EOS micropatches.pic.twitter.com/68cVHDty9d
-
Tomorrow Windows 7 and Windows Server 2008 R2 get their last regular security updates! Unable to upgrade to newer Windows? We'll provide security micropatches for you for THREE ADDITIONAL YEARS! See http://0patch.com/#custom-area for more information.pic.twitter.com/NLXMcONGb0
-
Just FOUR days until Windows 7 and Windows Server 2008 R2 get their last regular security updates! Unable to upgrade to newer Windows? We'll provide security micropatches for you for THREE ADDITIONAL YEARS! See https://0patch.com/#custom-area for more information.pic.twitter.com/ohY9oekfy4
-
0patch Central: We are Now Ready to Micropatch Your Enterprise https://blog.0patch.com/2020/01/0patch-central-we-are-now-ready-to.html …pic.twitter.com/tmXYbCDnVF
-
It is now 10 days until the last regular Windows 7 and Windows Server 2008 R2 updates. If you are keeping these Windows for whatever reason, we can get you micropatches for their most critical vulnerabilities. Can we handle big orgs too? Yes we can. https://0patch.com/#custom-area pic.twitter.com/urUYsl68bj
-
Give your loved ones a gift of keeping Windows 7 for three more years! Install 0patch PRO on their computers and have security micropatches automatically applied as we issue them. Learn more about our "security-adopting" Windows 7: https://0patch.com pic.twitter.com/BXwzwxnttv
-
-
Less than 48 hours ago,
@decoder_it published details of an "arbitrary file overwrite" vulnerability in Dropbox for Windows (no vendor patch available), allowing a local attacker to execute code as System. The issue doesn't have a CVE ID yet, but it now has a FREE micropatch.pic.twitter.com/B9DFGVp8pQ
Prikaži ovu nit -
We're happy to announce that EARLY ACCESS TO 0PATCH CENTRAL IS NOW AVAILABLE! If you have a non-trivial fleet of Windows computers to protect with our micropatches, 0patch Central is your central management solution. Request your access by sending an email to sales@0patch.com!pic.twitter.com/nMSCFkC2iU
Prikaži ovu nit -
Exciting news! 0patch goes Enterprise with early access to 0patch Central on Monday. If you're interested in trying out central management of 0patch Agents, drop a note to sales@0patch.com and we'll send you an invite. (Let us know which email you're using so we can set it up.)pic.twitter.com/ZAOlwbS3nM
-
Today we issued a micropatch for CVE-2019-1429, a use-after-free vulnerability in Microsoft Scripting Engine that is being exploited in the wild. While it isn't a 0day (November Windows Updates include a fix), we decided to micropatch it for users who can't apply MS update (yet).pic.twitter.com/sqiHtLRUxd
Prikaži ovu nit -
0patch Central, our central management app (think of it as "WSUS for 0patch") is coming along nicely and will soon be ready for early access. If you're considering using 0patch in a large network, please contact sales@0patch.com to get early access and some trial licenses.pic.twitter.com/tHMhD423ja
-
Ponemon/ServiceNow report (Cost and Consequences of Gaps in Vulnerability Response): 60% respondents from organizations surviving data breach say these breaches could have occurred because a patch was available for known vulnerability but not applied. https://bit.ly/2WI04HR pic.twitter.com/fXG1eDfjaL
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.