From 22292161b2151aa2fcf252768fa138d58811f961 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 30 Jul 2018 08:33:39 -0700 Subject: [PATCH] updates --- windows/security/intelligence/exploits-malware.md | 6 ++++-- windows/security/intelligence/macro-malware.md | 2 +- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/windows/security/intelligence/exploits-malware.md b/windows/security/intelligence/exploits-malware.md index c49baa337e..b3a6287db3 100644 --- a/windows/security/intelligence/exploits-malware.md +++ b/windows/security/intelligence/exploits-malware.md @@ -24,7 +24,7 @@ The most common method used by attackers to distribute exploits and exploit kits The infographic below shows how an exploit kit might attempt to exploit a PC when a compromised webpage is visited. -![example of how exploit kits work](./images/exploitkit.png) +![example of how exploit kits work](./images/ExploitKit.png) *Example of how exploit kits work* @@ -32,7 +32,9 @@ Several notable threats, including Wannacry, exploit the Server Message Block (S Prevalent exploit kits include: - Angler / [Axpergle](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fAxpergle) + - [Neutrino](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fNeutrino) + - [Nuclear](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Exploit:JS/Neclu) ## How we name exploits @@ -48,4 +50,4 @@ You can read more on the [CVE website](https://cve.mitre.org/). The best prevention for exploits is to keep your organization's software up-to-date. Software vendors provide updates for many known vulnerabilities and making sure these updates are applied to all devices is an important step to prevent malware. -For more general tips, see [prevent malware infection](prevent-malware-infection). +For more general tips, see [prevent malware infection](prevent-malware-infection.md). diff --git a/windows/security/intelligence/macro-malware.md b/windows/security/intelligence/macro-malware.md index d38a631f72..b6b886514b 100644 --- a/windows/security/intelligence/macro-malware.md +++ b/windows/security/intelligence/macro-malware.md @@ -48,4 +48,4 @@ We've seen macro malware download threats from the following families: - Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads. -For more general tips, see [prevent malware infection](prevent-malware-infection). \ No newline at end of file +For more general tips, see [prevent malware infection](prevent-malware-infection.md). \ No newline at end of file