Article
Microsoft Vulnerability – CVE-2020-0601
Security Alert: Any user of Windows 10, or Windows Server 2016 or 2019 will no longer be protected without the security update. We recommend getting in touch with your IT team or provider and making sure that installing this patch is a time-sensitive priority.
As you may have read in the news, Microsoft’s Patch Tuesday on January 14th, 2020 was a historical one. The National Security Agency of the United States updated Microsoft about a vulnerability they deemed so dangerous, the agency broke precedent and revealed the bug to the vendor for the first time in history.
This vulnerability strikes at the core of trust that the internet is built upon. Once exploited, malicious websites and files will appear to users to come from trustworthy sources. Users will have no way of knowing if confidential information they enter on a website will be spied on, or if a file they download contains malware that could infect an organization with ransomware.
Any user of Windows 10, or Windows Server 2016 or 2019 will no longer be protected without the security update. You should install this security update on every computer or server that uses these operating systems. We recommend getting in touch with your IT team or provider and making sure that installing this patch is a time-sensitive priority.
You can find the link to the security updates corresponding to your systems on Microsoft’s website. For more info about the vulnerability, CVE-2020-0601, read this article.
If you think you may be affected and have a question, please send an email to security@at-bay.com.