Customers running Windows 10 were not targeted by the attack today. We also know that some of our customers are running versions of Windows that no longer receive mainstream support.That means those customers will not have received the above mentioned Security Update released in March.

updating this blog-18

For more information about the Critical Patch Update program, see the security vulnerability remediation practices page located on Oracle’s corporate security practices site.

In this release of August, we have made several feature and improvements!

Customers should use vigilance when opening documents from untrusted or unknown sources.

For Office 365 customers we are continually monitoring and updating to protect against these kinds of threats including Ransom: Win32/Wanna Crypt.

Io T Plug and Play tooling public preview On August 22, 2019, we released a preview of Io T Plug and Play.

Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows.

If customers have automatic updates enabled or have installed the update, they are protected.

For other customers, we encourage them to install the update as soon as possible.

Vulnerable in-support systems include Windows 7, Windows Server 2008 R2, and Windows Server 2008.

Downloads for in-support versions of Windows can be found in the Microsoft Security Update Guide.

The Remote Desktop Protocol (RDP) itself is not vulnerable.