mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
updates
This commit is contained in:
@ -24,7 +24,7 @@ The most common method used by attackers to distribute exploits and exploit kits
|
|||||||
|
|
||||||
The infographic below shows how an exploit kit might attempt to exploit a PC when a compromised webpage is visited.
|
The infographic below shows how an exploit kit might attempt to exploit a PC when a compromised webpage is visited.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
*Example of how exploit kits work*
|
*Example of how exploit kits work*
|
||||||
|
|
||||||
@ -32,7 +32,9 @@ Several notable threats, including Wannacry, exploit the Server Message Block (S
|
|||||||
|
|
||||||
Prevalent exploit kits include:
|
Prevalent exploit kits include:
|
||||||
- Angler / [Axpergle](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fAxpergle)
|
- Angler / [Axpergle](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fAxpergle)
|
||||||
|
|
||||||
- [Neutrino](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fNeutrino)
|
- [Neutrino](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fNeutrino)
|
||||||
|
|
||||||
- [Nuclear](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Exploit:JS/Neclu)
|
- [Nuclear](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Exploit:JS/Neclu)
|
||||||
|
|
||||||
## How we name exploits
|
## How we name exploits
|
||||||
@ -48,4 +50,4 @@ You can read more on the [CVE website](https://cve.mitre.org/).
|
|||||||
|
|
||||||
The best prevention for exploits is to keep your organization's software up-to-date. Software vendors provide updates for many known vulnerabilities and making sure these updates are applied to all devices is an important step to prevent malware.
|
The best prevention for exploits is to keep your organization's software up-to-date. Software vendors provide updates for many known vulnerabilities and making sure these updates are applied to all devices is an important step to prevent malware.
|
||||||
|
|
||||||
For more general tips, see [prevent malware infection](prevent-malware-infection).
|
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
|
||||||
|
@ -48,4 +48,4 @@ We've seen macro malware download threats from the following families:
|
|||||||
|
|
||||||
- Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads.
|
- Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads.
|
||||||
|
|
||||||
For more general tips, see [prevent malware infection](prevent-malware-infection).
|
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
|
Reference in New Issue
Block a user