This article is more than 1 year old
Zero-day IE fix stars in last Patch Tuesday of the decade
Critical Office and Win updates also lined up
Microsoft is lining up a fix for a zero-day vulnerability in Internet Explorer as part of the decade's last ever Patch Tuesday update.
Tuesday is due to bring six bulletins, three of which are critical. The critical fixes address flaws in Windows and Office as well as IE. The Office update covers flaws in Project, Word and Works 8.5.
Only systems running Windows Server 2008 R2 duck the crucial flaws. All other supported operating systems - including Vista and Windows 7 - will need patching against double plus bad vulnerabilities.
The Noughties' last edition of Patch Tuesday covers 12 vulnerabilities in total across six bulletins. Windows systems will need to be rebooted after patches are applied, as explained in a post on Microsoft Security Response blog.
Redmond's Patch Tuesday pre-alert can be found here. ®
More about
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- Application Delivery Controller
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- Identity Theft
- Incident response
- Infosec
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Phishing
- Pluton
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- SharePoint
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Y2K
- Zero Day Initiative
- Zero trust
Broader topics
More about
More about
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- Application Delivery Controller
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- Identity Theft
- Incident response
- Infosec
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Phishing
- Pluton
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- SharePoint
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Y2K
- Zero Day Initiative
- Zero trust