ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft is Releasing Out-of-Band Security Updates

Microsoft is Releasing Out-of-Band Security Updates

Patching your software is one of the most important, yet ignored, tasks in computing. Keeping all of your software up to date with the latest threat definitions can help your business’ IT stay secure. Recently, in a somewhat atypical move, Microsoft has announced that they have released an emergency out-of-band security update to fix two critical security issues. 

The two vulnerabilities were patched off of Microsoft’s typical “patch Tuesday” schedule that sees the software giant release bug fixes every second Tuesday of the month. The fact that they broke their patch schedule suggests that the two vulnerabilities were critical for their customers. Let’s take a look at the two updates and how they’ll function to secure Microsoft products. 

Internet Explorer Zero-Day

The first, and obviously most significant patch, is a zero-day vulnerability found in Internet Explorer, the antiquated (and much maligned) Internet Browser that comes on most Microsoft operating systems. Since this is a zero-day event, the vulnerability had already been exploited in places. 

Little is known about the vulnerability, but Microsoft did call it a remote code execution exploit that if accessed could give a user control over the user account of another. The attack requires phishing an Internet Explorer user onto a malicious website, but once there, an attacker would be able to gain access over the user account of the visitor. 

Luckily, IE currently has an active market share of under two percent, but attacks have already happened so remaining vigilant about the use of IE, and your network’s patch management is key to keeping this particular vulnerability from causing problems for your organization.

Microsoft Defender DOS Bug

The other issue fixed in the out-of-band patch was a denial of service vulnerability in Microsoft Defender. The antivirus program ships with all Windows 10 PCs and is a core component in Windows 10’s sterling security record. 

The bug itself isn’t much of an issue. To successfully exploit it an attacker would need unfettered access to a computer and the ability to execute some code. It disables Windows Defender components and gives people with access (and the ability to code) the chance to completely take over a system with malware or other more sophisticated programs. 

Keeping your software patched and running smoothly is extremely important. Reach out to our expert IT technicians today to see how ClearView IT can help you manage your system updates and software management at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Small Business Smartphones Microsoft Office Upgrade Mobile Devices Network Communication Data Recovery Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Covid-19 Passwords Holiday Disaster Recovery Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Blockchain Bandwidth Encryption Server Information Remote App Virtualization Spam Mobile Device Management WiFi Business Technology Apple Information Technology History Gmail Employee/Employer Relationship Office Budget Two-factor Authentication Office 365 Cybercrime Conferencing Access Control Health Data Security Big Data Wi-Fi Analytics BDR Cost Management IT Management Training Compliance Document Management Employer-Employee Relationship Save Money Patch Management Help Desk Hacking Vendor Remote Monitoring Remote Computing Voice over Internet Protocol Hacker Customer Service Managed Services Unified Threat Management Firewall Data loss Legal Augmented Reality Word Search... Best Practice Data storage IBM Website Retail Alert Applications Hiring/Firing Project Management Outlook BYOD Vulnerabilities Password Computing Vendor Management Money Mobile Office Hard Drive Sports Free Resource Social Twitter SaaS Google Maps DDoS Mobile Computing Scam Law Enforcement How To End of Support Marketing Printer iPhone VPN Running Cable Education Cortana Content Filtering Update Storage Router Travel Virtual Reality Data Breach Social Engineering The Internet of Things Cryptocurrency Paperless Office Antivirus YouTube Black Market Cleaning User Maintenance Windows 11 Robot Laptop Monitoring Healthcare Websites Chrome Remote Workers Meetings Mobility Windows 7 Virtual Private Network Administration Automobile Telephone Presentation Specifications Current Events How To Microchip IT Consultant Excel Solutions Flexibility Disaster Customer Relationship Management Integration Co-Managed IT Tech Terms Images 101 Identity Theft Entertainment Display Lithium-ion battery Hack Notifications Managed IT Unified Communications Virtual Assistant Digital Employees Google Docs Processors Bluetooth Taxes Avoiding Downtime Distributed Denial of Service Office Tips Holidays Memory Private Cloud Processor Cooperation HIPAA Video Conferencing Physical Security Politics Virtual Machines Wireless Technology Settings Computer Repair eWaste Machine Learning Multi-factor Authentication Professional Services Start Menu Downtime Computer Care Solid State Drive Downloads Safety Vulnerability Saving Time Chromebook Software as a Service Virtual Desktop Drones Managed Services Provider Bitcoin Data Protection Computers PowerPoint Experience Download Windows 8 Supercomputer Piracy Google Calendar Term Google Apps Virus Telework Electronic Payment HTML Advertising Motion Sickness Microsoft 365 Cables Relocation Browsers Smartwatch Displays Nanotechnology Communitications Staffing Work/Life Balance Google Drive Upload Procurement Tech Support Software License IP Address Comparison Google Play Social Network FinTech Phone System Point of Sale Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value In Internet of Things Television Security Cameras Hacks Customer Resource management Organization Network Congestion Cabling Devices Cyber security Shortcuts G Suite Tip of the week Competition Reliable Computing Fileless Malware Writing Tablet Smart Devices Recovery VoIP Gamification Remote Working Tracking Company Culture Computer Accessories Mouse Telephone System AI LiFi Regulations Trend Micro Be Proactive Entrepreneur Documents Web Server Transportation Application Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Business Intelligence Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Access Database Surveillance Securty Videos Time Management Music Public Cloud Managing Costs Domains SSID Health IT Equifax Spyware Tactics Development Troubleshooting Hard Drive Disposal Employer/Employee Relationships Audit Media Botnet Username File Sharing Virtual Machine Freedom of Information Smart Technology Rental Service Redundancy Reviews Micrsooft Startup Optimization Flash Cache Addiction email scam Teamwork Public Speaking Navigation 2FA Telephone Systems Unified Threat Management Data Storage Streaming Media Business Growth Workers Mobile Security Hypervisor News Medical IT Keyboard User Tip Shopping Legislation Network Management Business Owner CCTV SQL Server Hard Drives Printing Evernote Paperless Banking Touchscreen PCI DSS Google Wallet Licensing intranet Computer Malfunction Fake News Supply Chain Shortcut Messenger Emergency Proxy Server Gig Economy Deep Learning Emails Humor Wireless Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Heating/Cooling Environment Business Communications Business Metrics Management Regulations Compliance Windows XP Hosted Solution Samsung Device security Managed IT Service Social Networking Webcam Microsoft Excel Workplace Books Uninterrupted Power Supply Wireless Headphones Memes Language Business Mangement Going Green Net Neutrality Inbound Marketing Society Business Cards Tech Human Resources Error Financial Data Tablets Visible Light Communication Scams Reading Bookmark Risk Management Monitors IT

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?