Dear customer!
The National Security Institute for Cyber Defense (NBSZ NKI) Alert It gives a Microsoft programming Decisive Because of the weaknesses, intensity, use of, and the spread of software on a large scale.
In Microsoft 2025, the monthly safety package in February 55 various He corrected a security errorIt includes 4 computers Zero Day (Zero Day) The attackers were also active):
CVE-2025-21391-Windows
CVE-2025-21418-Wodows
Cve-2025-21194-Microsoft Surface Surface
CVE-2025-21377 -NTLM fragmentation to detect weakness
The affected products and roles: Microsoft High Performance Compute Pack (HPC) Linux Node Agent, Windows Kerneel, Windows Installer, Windows Message Queuing, and Microsoft Autoupdate (MAU), and Windows LDAP – Protocol access to lightweight guide, Windows Update Stack, and Microsoft Dynamics 36, and Microsoft Edge (Chromium – based on), Microsoft Windows, Microsoft Surface, Windows Kerberos, Microsoft PC Manager, Windows DHCP Service, Windows Service Clean The office is remotely and Windows, Windows TelePlic Windows NTLM, DISK Windows Cleaning tool, Windows Rsilient Resilient (Refs), Windows Internet (ICS), and Microsoft Crosoft Office Windows Coremesaging, Windows Win32 Kernel Subsy . Edge for iOS and Android, Windows DWM Core, Visual Studio, Windows DHCP Client, ER.
NBSZ NKI recommends that safety updates install immediately, which are available with automatic update and can be manually downloaded from manufactured websites.
References: