ACROS Security

@AcrosSecurity

ACROS Security research lab is specialized in providing profound security analyses of products and systems.

Vrijeme pridruživanja: rujan 2010.

Tweetovi

Blokirali ste korisnika/cu @AcrosSecurity

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AcrosSecurity

  1. Prikvačeni tweet
    3. tra 2019.

    Dear 0patch family, we've launched 0patch PRO, a new plan for professional computer users and organizations. 0patch remains FREE for personal and non-profit educational use, but some future patches will only be provided to PRO users.

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Paging 24 million instances of now-unsupported Windows Server 2008! 0patch will have security micropatches to keep you patched for three more years, along with Windows 7. Contact sales@0patch.com for details on enterprise deployment and central management.

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    How will our users running Windows 7 and Windows Server 2008 R2 learn about the status of our monthly security micropatches?

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Upon popular demand, we have just ported our "CVE-2020-0674 workaround" micropatch to both 32-bit and 64-bit: Windows 10 v1903 Windows 10 v1909 Both are included in 0patch FREE

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Malicious RTF files exploiting Equation Editor vulnerabilities are being detected across the globe. Everyone: 0patch FREE includes free micropatches for all known Equation Editor vulnerabilities and will block these attacks. Did I mention it was FREE? Use it.

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    Deciding between 0patch and Extended Security Updates for your Windows 7 and Server 2008 R2 computers? We'll give you a one-month free trial for your entire Windows fleet so you can test us. If you don't like what you get, you can still go with ESU. Email sales@0patch.com

    Poništi
  7. proslijedio/la je Tweet
    28. sij

    The micropatch simply overrides Outlook's reading of WebView settings for determining whether Home Page is enabled, and makes Outlook believe the answer is "disabled" regardless of what the Registry says. This prevents the bypass. Source code contains just one instruction:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    28. sij

    We issued a micropatch for CVE-2017-11774, a remote code execution vulnerability in Outlook that has been widely exploited and remains popular with attackers. In contrast to official patch which could be reverted by non-admins, micropatch will reliably disable Outlook Home Page.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. sij

    Banks worldwide! You now have, and will continue to have, hundreds of millions of users on Windows 7 without security updates. Buying them a 0patch license just might be a net positive for you.

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Governments worldwide, start your 0patch pilot now so that next year you'll pay half the price for 0patch Windows 7 security micropatches compared to ESU.

    Poništi
  11. proslijedio/la je Tweet
    21. sij

    Windows 7 and Server 2008 R2 may never get official patches for CVE-2020-0674, so as part of our "security adoption" program () we're providing these micropatches instead. Also blog post:

    Poništi
  12. proslijedio/la je Tweet
    21. sij

    Micropatches disabling jscript.dll (CVE-2020-0674) in Internet Explorer 11 and apps using its browser component are now out for both 32-bit and 64-bit: Windows 7 Windows 10 v1709/v1803/v1809 Windows Server 2008 R2 Windows Server 2019 All included in 0patch FREE.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    21. sij
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    21. sij

    On January 9, 2020, NitroPDF issued an update that fixes all 0days. We recommend all users update to the latest version of NitroPDF, which will automatically render our micropatches obsolete.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    20. sij

    Next: testing and porting to various Windows/IE versions; release is scheduled for tomorrow. Micropatch will be free for non-commercial use. Organizations worried about CVE-2020-0674 are welcome to contact us for details and porting to their specific versions at sales@0patch.com

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    20. sij

    We have a micropatch candidate for CVE-2020-0674. It blocks loading of JScript.Encode and JScript.Compact components in Internet Explorer, effectively implementing Microsoft's workaround but without changing ACLs on jscript.dll. It also doesn't break Windows Media Player.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    19. sij

    If you have implemented Microsoft's workaround for CVE-2020-0674 and encountered negative side effects, please report them here, via DM, or to support@0patch.com (and also to Microsoft)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    19. sij

    We are planning to issue a micropatch for CVE-2020-0674 next week which will prevent Internet Explorer from loading jscript.dll, effectively implementing Microsoft's workaround but without some unwanted side effects such as breaking the sfc command. (cont)

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    17. sij

    Enterprises and governments still on Windows 7 and Server 2008 R2! We'll keep your computers security-patched up to 3 more years. No reboots, instantly apply and remove patches while users are working, central management. Contact sales@0patch.com

    Poništi
  20. proslijedio/la je Tweet
    16. sij

    Important: Some media articles are claiming that our post-EOS Windows 7 micropatches are free. This is incorrect. Post-EOS Windows 7 and Windows Server 2008 R2 security micropatches are only available with a PRO license. Please consult our FAQ:

    Poništi
  21. proslijedio/la je Tweet
    15. sij

    Inquiries for 0patch Enterprise are overwhelming! CIOs, CISOs, admins - we're humbled by the trust you're putting in us. Thank you, we'll do all we can to make your security patching simple and uneventful!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·