mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 10:23:37 +00:00
updates
This commit is contained in:
@ -24,7 +24,7 @@ The most common method used by attackers to distribute exploits and exploit kits
|
||||
|
||||
The infographic below shows how an exploit kit might attempt to exploit a PC when a compromised webpage is visited.
|
||||
|
||||

|
||||

|
||||
|
||||
*Example of how exploit kits work*
|
||||
|
||||
@ -32,7 +32,9 @@ Several notable threats, including Wannacry, exploit the Server Message Block (S
|
||||
|
||||
Prevalent exploit kits include:
|
||||
- Angler / [Axpergle](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fAxpergle)
|
||||
|
||||
- [Neutrino](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fNeutrino)
|
||||
|
||||
- [Nuclear](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Exploit:JS/Neclu)
|
||||
|
||||
## How we name exploits
|
||||
@ -48,4 +50,4 @@ You can read more on the [CVE website](https://cve.mitre.org/).
|
||||
|
||||
The best prevention for exploits is to keep your organization's software up-to-date. Software vendors provide updates for many known vulnerabilities and making sure these updates are applied to all devices is an important step to prevent malware.
|
||||
|
||||
For more general tips, see [prevent malware infection](prevent-malware-infection).
|
||||
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
|
||||
|
Reference in New Issue
Block a user