Don’t wait to install the June Windows update — it fixes a major security bug. Microsoft has patched a Windows vulnerability that hackers are actively exploiting. On the off chance that you own a framework that utilizes Windows 7 and up, you’ll want to update your PC without a moment’s delay (via Bleeping Computer).

The security flaw, called Follina (CVE-2022-30190) by researchers, allows bad actors to hijack clients’ PCs through programs like Microsoft Word. Security researchers have known about the threat since late May, however Microsoft apparently excused their initial discoveries.

In an attack archived by security company Proofpoint, hackers associated with the Chinese government sent malicious Word reports to Tibetan beneficiaries. At the point when opened, these records utilize the Follina exploit to take control of the Microsoft Support Diagnostic Tool (MSDT) to execute commands that could be utilized to install programs, create new client accounts, and access, erase, or change data stored on a PC. The exploit has also been utilized in phishing campaigns targeting American and European government agencies.

Don’t wait to install the June Windows update — it fixes a major security bug

Microsoft’s original warning about the threat offered workarounds to safeguard against the threat One Punch Man movie, however this update (KB5014699 for Windows 10 and KB5014697 for Windows 11) ought to eliminate the requirement for that. “Microsoft firmly prescribes that customers install the updates to be completely shielded from the vulnerability,” Microsoft says. “Customers whose frameworks are arranged to get automatic updates don’t have to take any further action.”

The Meta Quest 2 (recently known as the Oculus Quest 2) is a feature-packed VR headset that’s gotten better with time. Whether you already own one, or plan to get one sooner or later, here are a few hints and accessory recommendations that ought to assist you with getting greater delight out of the headset.

Leave a Comment

Your email address will not be published. Required fields are marked *