Close Menu
geekfence.comgeekfence.com
    What's Hot

    Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld

    May 1, 2026

    Introducing ACL Hydration: secure knowledge workflows for agentic AI

    May 1, 2026

    Modern transfer protocols evolving to protect cloud data

    May 1, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»UK Tech News»Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld
    UK Tech News

    Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld

    AdminBy AdminMay 1, 2026No Comments2 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld
    Share
    Facebook Twitter LinkedIn Pinterest Email



    A difficult balance

    Erik Avakian, technical counselor at Info-Tech Research Group, noted that when it set the patching deadline, CISA had been operating within the guidelines laid down in Binding Operational Directive (BOD) 22-01, which requires US federal  agencies to patch vulnerabilities within the timelines outlined under the policy, which range from 14 to 21 days.

    “In cases of high-risk exploitation, CISA can shorten the deadline to three days,” he said. “But in the case of CVE-2026-32202, the CVSS score was rated at 4.3, and even though the vulnerability has been actively exploited, the rating does not meet the policy threshold for a faster patch cycle. In this case, CISA allotted a 14-day deadline, which meets its aggressive timeline standard based on the vendor rating.”

    He said that there is indeed an argument that the 14 day window to patch a vulnerability that is being actively exploited in the wild is too long. But, he said, “I’m assuming in this case, the reason why it was not elevated to an emergency directive type patch cycle (which would require as little as 48 to 72 hours to patch) is due to Microsoft’s rating, as well as several other factors”.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    Duck Creek is entering its operating model era

    April 29, 2026

    Guinness Enterprise Centre start-ups generated €140M revenues last year

    April 28, 2026

    OpenAI plans its own ‘iPhone killer’ – Computerworld

    April 27, 2026

    Oppo Pad mini: Hands-on Impressions

    April 26, 2026

    Offshore CX enters a new era of scrutiny: why enterprises must rethink delivery models

    April 25, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202533 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202626 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views
    Don't Miss

    Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld

    May 1, 2026

    A difficult balance Erik Avakian, technical counselor at Info-Tech Research Group, noted that when it…

    Introducing ACL Hydration: secure knowledge workflows for agentic AI

    May 1, 2026

    Modern transfer protocols evolving to protect cloud data

    May 1, 2026

    Voices from the field: Helping farmers build resilient local economies across rural America

    May 1, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld

    May 1, 2026

    Introducing ACL Hydration: secure knowledge workflows for agentic AI

    May 1, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.