Jump to content

Microsoft Support & Discussions

Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product discussions and help.

  1. Guest MSRC
    Started by Guest MSRC,

    2018 年 4 月 11 日 (日本時間)、マイクロソフトは以下のソフトウェアのセキュリティ更新プログラムを公開しまし Continue reading...

    • 0 replies
    • 0 views
  2. Guest MSRC
    Started by Guest MSRC,

    Today, we released security updates to provide additional protections against malicious attackers. By default, Windows 10 receives these updates automatically, and for customers running previous versions, we recommend they turn on automatic updates as a best practice. More information about this month’s security updates can be found in the Security Update Guide. Continue reading...

    • 0 replies
    • 0 views
  3. Guest MSRC
    Started by Guest MSRC,

    本記事は、Security Research & Defense のブログ “Triaging a DLL planting vulnerability” (2018 年 4 月 Continue reading...

    • 0 replies
    • 0 views
  4. Guest MSRC
    Started by Guest MSRC,

    DLL planting (aka binary planting/hijacking/preloading) resurface every now and then, it is not always clear on how Microsoft will respond to the report. This blog post will try to clarify the parameters considered while triaging DLL planting issues. It is well known that when an application loads a DLL without specifying a fully qualified path, Windows attempts to locate the DLL by searching a well-defined set of directories in an order known as DLL search order. Continue reading...

    • 0 replies
    • 0 views
  5. Guest MSRC
    Started by Guest MSRC,

    On January 3rd, 2018, Microsoft released an advisory and security updates that relate to a new class of discovered hardware vulnerabilities, termed speculative execution side channels, that affect the design methodology and implementation decisions behind many modern microprocessors. This post dives into the technical details of Kernel Virtual Address (KVA) Shadow which is the Windows kernel mitigation for one specific speculative execution side channel: the rogue data cache load vulnerability (CVE-2017-5754, also known as “Meltdown” or “Variant 3”). Continue reading...

    • 0 replies
    • 0 views
  6. Guest MSRC
    Started by Guest MSRC,

    本記事は、Microsoft Security Response Center のブログ “Speculative Execution Bounty Launch” (2016 年 3 月 14 日 米国 Continue reading...

    • 0 replies
    • 0 views
  7. Guest MSRC

    On January 3rd, 2018, Microsoft released an advisory and security updates related to a newly discovered class of hardware vulnerabilities involving speculative execution side channels (known as Spectre and Meltdown) that affect AMD, ARM, and Intel CPUs to varying degrees. If you haven’t had a chance to learn about these issues, we recommend watching The Case of Spectre and Meltdown by the team at TU Graz from BlueHat Israel, reading the blog post by Jann Horn (@tehjh) of Google Project Zero, or reading the FOSDEM 2018 presentation by Jon Masters of Red Hat. Continue reading...

    • 0 replies
    • 0 views
  8. Guest MSRC
    Started by Guest MSRC,

    Today, Microsoft is announcing the launch of a limited-time bounty program for speculative execution side channel vulnerabilities. This new class of vulnerabilities was disclosed in January 2018 and represented a major advancement in the research in this field. In recognition of that threat environment change, we are launching a bounty program to encourage research into the new class of vulnerability and the mitigations Microsoft has put in place to help mitigate this class of issues. Continue reading...

    • 0 replies
    • 0 views
  9. Guest MSRC
    Started by Guest MSRC,

    2018 年 3 月 14 日 (日本時間)、マイクロソフトは以下のソフトウェアのセキュリティ更新プログラムを公開しまし Continue reading...

    • 0 replies
    • 0 views
  10. Guest MSRC
    Started by Guest MSRC,

    Today, we released security updates to provide additional protections against malicious attackers. By default, Windows 10 receives these updates automatically, and for customers running previous versions, we recommend they turn on automatic updates as a best practice. More information about this month’s security updates can be found in the Security Update Guide. Continue reading...

    • 0 replies
    • 0 views
  11. Guest MSRC

    本記事は、Microsoft Secure ブログ “How to mitigate rapid cyberattacks such as Petya and WannaCrypt” (2018 年 2 月 21 日 米国時 Continue reading...

    • 0 replies
    • 0 views
  12. Guest MSRC
    Started by Guest MSRC,

    本記事は、Microsoft Secure ブログ “Overview of Petya, a rapid cyberattack” (2018 年 2 月 5 日 米 Continue reading...

    • 0 replies
    • 0 views
  13. Guest MSRC

    セキュリティ更新プログラムの情報は「セキュリティ更新プログラム ガイド」ダッシュボードから入手できるこ Continue reading...

    • 0 replies
    • 0 views
  14. Guest MSRC
    Started by Guest MSRC,

    For the second in this series of blog entries we want to look into which vulnerability reports make it into the monthly release cadence. It may help to start with some history. In September 2003 we made a change from a release anytime approach to a mostly predictable, monthly release cadence. Continue reading...

    • 0 replies
    • 0 views
  15. Guest MSRC

    本記事は、Microsoft Secure ブログ “Overview of rapid cyberattacks” (2018 年 1 月 23 日 米国 Continue reading...

    • 0 replies
    • 0 views
  16. Guest MSRC
    Started by Guest MSRC,

    更新履歴 2018/2/15 更新: ADV180005 の公開に関する情報を追記しました。 -—————————- 2018 年 2 月 14 日 (日本時間)、マイクロソフトは以下 Continue reading...

    • 0 replies
    • 0 views
  17. Guest MSRC
    Started by Guest MSRC,

    Today, we released security updates to provide additional protections against malicious attackers. By default, Windows 10 receives these updates automatically, and for customers running previous versions, we recommend they turn on automatic updates as a best practice. More information about this month’s security updates can be found in the Security Update Guide. Continue reading...

    • 0 replies
    • 0 views
  18. Guest MSRC

    本記事は、Microsoft Secure ブログ “Now you see me: Exposing fileless malware” (2018 年 1 月 24 日 米国時間公開) を翻 Continue reading...

    • 0 replies
    • 0 views
  19. Guest MSRC

    本記事は、Microsoft Secure ブログ “A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017” (2018 年 1 月 10 日 米国時間公開 Continue reading...

    • 0 replies
    • 0 views
  20. Guest MSRC
    Started by Guest MSRC,

    本記事は、Windows Security のブログ “Introducing Windows Defender Application Control” (2017 年 10 月 23 日 米国時間 Continue reading...

    • 0 replies
    • 0 views
  21. Guest MSRC
    Started by Guest MSRC,

    This is the first of a series of blog entries to give some insight into the Microsoft Security Response Center (MSRC) business and how we work with security researchers and vulnerability reports. The Microsoft Security Response Center actively recognizes those security researchers who help us to protect our several billion customers and their endpoints in several ways. Continue reading...

    • 0 replies
    • 0 views
  22. Guest MSRC

    本記事は、Microsoft Secure ブログ “How to disrupt attacks caused by social engineering” (2018 年 1 月 10 日 米国時間 Continue reading...

    • 0 replies
    • 0 views
  23. Guest MSRC

    本記事は、Microsoft Secure ブログ “Microsoft teams up with law enforcement and other partners to disrupt Gamarue (Andromeda) Continue reading...

    • 0 replies
    • 0 views
  24. Guest MSRC

    本記事は、Microsoft Secure のブログ “Windows Defender ATP machine learning and AMSI: Unearthing script-based attacks that ‘live off the land’” Continue reading...

    • 0 replies
    • 0 views
  25. Guest MSRC

    本記事は、Microsoft Secure ブログ “Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems” Continue reading...

    • 0 replies
    • 0 views