• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Microsoft Archive

CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

Estimated reading time: 5 minutes

On May 30, 2022, CVE-2022-30190 “FOLLINA,” a zero-day remote code execution vulnerability discovered in Microsoft Windows Support Diagnostic Tool (MSDT) with high severity (CVSS:9.3). This MSDT tool diagnoses issues with applications such as Microsoft Office documents. Initial attack vector...
Read More
June 10, 2022

Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

Estimated reading time: 2 minutes

A Zero-day Remote Code Execution Vulnerability with high severity has been identified as CVE-2022-30190 “FOLLINA” in Microsoft Windows Support Diagnostic Tool (MSDT). MSDT is a tool present on Windows version 7 and above and is used for diagnosis of...
Read More
June 3, 2022

Seqrite Endpoint Security Cloud Supports Windows 10 21H2 Version

Seqrite Endpoint Security Cloud Supports Windows 10 21H2 Version

Estimated reading time: 2 minutes

Microsoft has recently developed a new feature update for Windows 10 PCs, Windows 10, version 21H2 (Windows 10 21H2). This article highlights some of the new features of Windows 10 21H2 and how Seqrite Endpoint Security Cloud is compatible...
Read More
November 17, 2021

Seqrite Endpoint Security Supports Windows 10 Feature Update Version 21H2

Seqrite Endpoint Security Supports Windows 10 Feature Update Version 21H2

Estimated reading time: 1 minute

Microsoft has recently developed a new feature update for Windows 10 PCs, Windows 10, version 21H2 (Windows 10 21H2). This article highlights some of the new features of Windows 10 21H2 and how Seqrite Endpoint Security (EPS) is compatible...
Read More
November 17, 2021

Seqrite announces SHA-1 deprecation for its products

Seqrite announces SHA-1 deprecation for its products

Estimated reading time: 2 minutes

SHA-1 and SHA-2 are the digest algorithms of the code signing certificate used by Seqrite to sign the code of its products.  According to an announcement, Microsoft will no longer allow certificate providers to issue SHA-1 supported certificates. Seqrite has...
Read More
May 27, 2021

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Estimated reading time: 7 minutes

On March 2, Microsoft announced a threat group, HAFNIUM, is actively exploiting four zero-day vulnerabilities in their Exchange Servers.  Microsoft has released out-of-band security updates (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065), enabling attackers to take access email accounts and run...
Read More
May 18, 2021

Enterprises using Microsoft’s collaboration tools under attack?

Enterprises using Microsoft’s collaboration tools under attack?

Estimated reading time: 2 minutes

Enterprise collaboration tools have seen an upsurge in popularity this year, thanks to the global pandemic forcing organizations all over the world to work from home. Even as the economy takes the initial step towards resumption, the days of...
Read More
June 24, 2020
Popular Posts
  • Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT June 3, 2022
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (300) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (14) windows (11)
Products
  • HawkkHunt
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.