How Microsoft fixed the LNK vulnerability… and other things

Microsoft released the awaited patch fixing the LNK vulnerability on Monday. Let’s have a look at how Microsoft fixed it, by performing a differential analysis on the shell32.dll library for Windows XP SP3. Several new functions have been added to […]

Mitigating the LNK 0-day with AppLocker

For a few days, the security ecosystem has been focusing on the Stuxnet malware and its innovative propagation method using a previously unknown vulnerability in the way Windows handles icons in LNK files. In Windows 7, using AppLocker helps mitigates […]

Vulnerability in Windows Media Services : epilog

No one missed it, the fix for the vulnerability in Windows Media Services that we reported to Microsoft was honored to be part of the small circle of patches pulled by the editor for not fixing the problem. Immediately after […]

/Launch malware

It is already known that the recent vulnerability (Ref. Lexsi 13190) in Adobe Acrobat/Reader when handling /Launch /Action is being exploited in the wild. Since yesterday, a new spam run exploiting this vulnerability has been spreading. The email comes from […]

Update: A new cybersquatting case for AFNIC…

Update : AFNIC contacted us regarding our recommandation to complain to them on this case. Since a few weeks, the regulatory context of the registry’s operations has changed. Regarding disputes, the 4th paragraph of the annex of this legal text […]