After Microsoft Releases Patch for RPC Exploit: What the Honeypot Saw (Slashdot)

Slashdot
After Microsoft Releases Patch for RPC Exploit: What the Honeypot Saw – Long-time Slashdot reader UnderAttack writes: After Microsoft patched and went public with CVE-2022-26809, the recent Remote Procedure Call vulnerability, the SANS Internet Storm Center set up a complete Windows 10 system exposing port 445/TCP to the world. The system is not patched for the RPC vulnerability. But so far, while …

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to our Newsletter