Search the Community
Showing results for tags 'microsoft'.
“Hackers are using booby-trapped Word documents to deliver malware to unsuspecting victims. The malware exploits Windows Object Linking and Embedding (OLE) features, which allow users to link to documents and other objects – in this case, a malicious remote server.”Source: https://www.vadesecure.com/en/word-doc-malware/This tool was created by the AutoLog team and has been since leaked. Here is the latest version of their OLE Doc Exploit.VirusTotal: https://www.virustotal.com/#/file/1b59c575fc8f3357982a4d917300725065946e31e3dd39f8b00c084aae8f3314/detection Download: https://www.0dayexploits.net/product/ole-doc-exploit/
What's up gang! OK, I call upon the wizards. I offer bandwidth to sacrifice! (Corny joke..) OK so here is the skinny: I have a computer at work. It's been a problem child since the opening (few years at least). Windows 7 32bit, Enterprise, on our server. It's been stuck on an update that I have officially ran out of options except a "Windows Repair". ** Security Update for WIndows 7 (KB2864202) ** - I've tried using Windows Update Troubleshooter. Nothing. - I've done SFC. Nothing. - I've tried installing VIA the stand-alone installer and downloading the update itself and installing. Nothing. - I've renamed the SoftwareDistribution folder to softwaredistribution.old. Nothing - I've ran chkdsk /f /r - Apparently the /f & the /r tags are DOA in windows 7..? at the time of writing this, I'm running a Defraggler scan , I read somewhere that sholves the issue. I've also seen a lot of articles referencing this update with Windows Vista (which is unsetling) Any thoughts?