Most of the affected Exchange servers have already been fixed with serious vulnerabilities released in early March – She said Quoted by RiskIQ Analysis on Twitter by Microsoft. The company said patches were installed on 92 percent of servers by its operators, an improvement of 43 percent within a week.
Redmond giant on March 2 this year Issued a correction A total of four critical vulnerabilities affected the 2013, 2016, and 2019 versions of Exchange Server – the company was already urging everyone to install patches right away, saying they were exposed to exploits of the vulnerabilities. The news was hit, of course, by a number of hacker groups who began to search intensively for vulnerable Exchange servers with Internet connections. Less than a week after the patches were issued, security experts now have hundreds of thousands of companies potentially at risk. They have spoken At the time, at least 30,000 enterprises in the United States were known to have been able to exploit vulnerabilities by attackers.
Hacker groups apparently tried to infiltrate as many servers as possible before the patches were installed – two weeks ago It has already been surrounded by at least ten organizations Weaknesses. According to ESET, most of the latter could be linked to intelligence organizations, but there were also organizers for cryptocurrency hunters.
Beckhoff’s Latest Small Format Industrial Computer for the Job (x)
The capabilities of the modular PC can also be customized and built with the environment – all with low energy consumption.
And to address Microsoft’s problems, as stated in ZDNet also highlights One plus spots Troubleshooting guide A one-click tool to prevent attacks until patches are installed. In addition, the company has updated Microsoft Defender Antivirus with capabilities needed to address the issues and attacks mentioned above.
While the spread rate of patches of 92 percent may seem encouraging at first glance, attackers can access many servers before applying patches and can place their own back doors, where they can access systems after installing the patch.