Government warns of high-risk for Microsoft services, including Windows- Here’s how to protect yourself
CERT-In has issued a high-risk warning regarding multiple vulnerabilities discovered in various Microsoft services. The vulnerabilities impact a wide range of Microsoft products such as Windows, Office, Developer Tools, Azure services, Bing, System Center, Dynamics, and Exchange Server.
CERT-In warns Microsoft users
According to CERT-In, the vulnerabilities could allow an attacker to gain additional privileges, disclose information, bypass security restrictions, perform remote code execution attacks, conduct spoofing attacks, or cause denial of service conditions. Essentially, these vulnerabilities can give hackers significant control over affected systems or compromise sensitive data.
Specifically, CERT-In has identified affected versions of the Windows operating system, including multiple iterations of Windows 10 and 11, with vulnerabilities that allow attackers to take control of devices or remotely access and steal data.
One of the contributing factors to these vulnerabilities, as identified by CERT-In, is a flaw in the SmartScreen feature designed to protect against malware. Instead of protecting devices, this vulnerability could allow malware to infiltrate systems, allowing attackers to exploit security vulnerabilities.
Update all Microsoft services immediately
To reduce the risk of these vulnerabilities, users are encouraged to ensure that their devices are regularly updated with the latest security patches and updates. These updates are crucial in fixing vulnerabilities and fixing security holes in the software or products you use.
In summary, CERT-In’s warning emphasizes the importance of remaining vigilant and proactive in protecting against cybersecurity threats by keeping software up-to-date and following recommended security practices. Recently, the government has issued a warning urging citizens to be careful. when using public phone charging stations in places such as airports, cafes, hotels and bus stops. The advice comes amid growing concerns about the “USB charger scam”, a tactic used by cybercriminals to take advantage of unsuspecting people who rely on these drives while on the go.
The USB charger scam poses a significant risk as it exploits the trust of people who trust public charging ports. Cybercriminals use a tactic called “juice-jacking” to compromise these ports and launch attacks against connected devices.