Today it is hard to imagine a company functioning without computers, software, IT network, away from modern technologies. Consequently, someone has to watch over all of it, control the proper operation of systems, solve possible…
At this time, Microsoft is aware of limited targeted attacks using the two vulnerabilities to get into users’ systems. In these attacks, CVE-2022-41040 can enable an authenticated attacker to remotely trigger CVE-2022-41082. It should be…