@ATTTechChannel
  @ATTTechChannel
AT&T Tech Channel | PrintNightmare Patch Doesn’t Fix Vulnerability| AT&T ThreatTraq @ATTTechChannel | Uploaded July 2021 | Updated October 2024, 4 days ago.
arstechnica.com/gadgets/2021/07/microsofts-emergency-patch-fails-to-fix-critical-printnightmare-vulnerability

Microsoft’s emergency patch to fix PrintNightmare’s vulnerability still allows attackers to take control of infected systems and run code of their choice. Matt Keyser, Karen Simon and Tony Tortorici of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.

Originally recorded on July 13, 2021.

AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com
PrintNightmare Patch Doesn’t Fix Vulnerability| AT&T ThreatTraq6/3/21 ThreatTraq Essentials| AT&T ThreatTraqMalware Targets Users with COVID-19 Lures| AT&T ThreatTraqThe Markley Quiz| AT&T ThreatTraqCybersecurity Predictions for 2022| AT&T ThreatTraqUPnProxy:  Eternal Silence Still Alive| AT&T ThreatTraqUPDATE: Colonial Pipeline Ransomware Attack| AT&T ThreatTraq7/15/21 ThreatTraq Essentials| AT&T ThreatTraqWhat are Hackers Doing on Your Server? | AT&T ThreatTraqIndustrial Control System (ICS) Vulnerabilities | AT&T ThreatTraq600 Million LinkedIn Users’ Info Sold Online| AT&T ThreatTraqNew Hacking Group Similar to Colonial Pipeline Attackers| AT&T ThreatTraq

PrintNightmare Patch Doesn’t Fix Vulnerability| AT&T ThreatTraq @ATTTechChannel

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER