{"id":140609,"date":"2022-06-14T19:02:32","date_gmt":"2022-06-15T00:02:32","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/06\/microsoft-patches-actively-exploited-follina-windows-zero-day"},"modified":"2022-06-14T19:02:32","modified_gmt":"2022-06-15T00:02:32","slug":"microsoft-patches-actively-exploited-follina-windows-zero-day","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/06\/microsoft-patches-actively-exploited-follina-windows-zero-day","title":{"rendered":"Microsoft patches actively exploited Follina Windows zero-day"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/microsoft-patches-actively-exploited-follina-windows-zero-day2.jpg\"><\/a><\/p>\n<p>Microsoft has released security updates with the June 2022 cumulative Windows Updates to address a critical Windows zero-day vulnerability known as Follina and actively exploited in ongoing attacks.<\/p>\n<p>\u201cMicrosoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action,\u201d Microsoft <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30190\" target=\"_blank\" rel=\"nofollow noopener\">said<\/a> in an update to the original advisory.<\/p>\n<p>\u201cMicrosoft recommends installing the updates as soon as possible,\u201d the company further <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\" target=\"_blank\" rel=\"nofollow noopener\">urged<\/a> customers in a post on the Microsoft Security Response Center.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released security updates with the June 2022 cumulative Windows Updates to address a critical Windows zero-day vulnerability known as Follina and actively exploited in ongoing attacks. \u201cMicrosoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1492],"tags":[],"class_list":["post-140609","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/140609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=140609"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/140609\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=140609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=140609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=140609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}