Our investigation into several vulnerabilities collectively referred to as “PrintNightmare” has determined that the default behavior of Point and Print does not provide customers with the level of security required to protect against potential attacks.
Today, we are addressing this risk by changing the default Point and Print driver installation and update behavior to require administrator privileges.
Category: Uncategorized
Point and Print の既定動作の変更
本記事は「Point and Print Default Behavior Change」の日本語抄訳です。 “PrintNightmare” と総称されるいくつかの脆弱性を調査した
2021 年 MSRC 最優秀セキュリティ研究者の表彰
本記事は「Congratulations to the MSRC 2021 Most Valuable Security Researchers!」の日本語抄訳です。 MSRC
Congratulations to the MSRC 2021 Most Valuable Security Researchers!
The MSRC Researcher Recognition Program offers public thanks and acknowledgement to the researchers who help protect customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s Most Valuable Security Researchers (MVRs) based on the impact, accuracy,
Security Update Validation Program (SUVP) に関するよくあるお問い合わせ
本記事は「Security Update Validation Program: the early bird tests the worm」の日本語抄訳です。 Security Update Validation Program (SUVP、セキュリテ
Introducing Bounty Awards for Teams Mobile Applications Security Research
We are pleased to announce the addition of Microsoft Teams mobile applications to the Microsoft Applications Bounty Program. Through the expanded program we welcome researchers from across the globe to seek out and disclose any high impact security vulnerabilities they may find in Teams mobile applications to help secure customers. Rewards up to $30,000 USD are available for eligible submissions.
Announcing the Top MSRC 2021 Q2 Security Researchers – Congratulations!
We’re excited to announce the top contributing researchers for the 2021 Second Quarter (Q2)! Congratulations to all the researchers recognized in this quarter’s leaderboard and thank you to everyone who continues to help secure our customers and the
Windows Print Spooler の脆弱性情報 (CVE-2021-34527) に関するお客様向けガイダンス
2021 年 7 月 7 日 (日本時間) に、マイクロソフトは Windows Print Spooler の脆弱性情報 CVE-2021-34527 を公開し、7 月 7 日と 8 日 (日本時間)