{"id":36578,"date":"2020-08-12T15:52:09","date_gmt":"2020-08-12T15:52:09","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31481\/An-Overview-Of-Microsofts-Recent-Patch-Tuesday.html"},"modified":"2020-08-12T15:52:09","modified_gmt":"2020-08-12T15:52:09","slug":"an-overview-of-microsofts-recent-patch-tuesday","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/","title":{"rendered":"An Overview Of Microsoft&#8217;s Recent Patch Tuesday"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/08\/windows-update1-800x552.jpg\" alt=\"0-days, a failed patch, and a backdoor threat. Update Tuesday highlights\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"44 posters participating, including story author\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2020\/08\/update-tuesday-fixes-2-0days-and-botched-patch-for-a-backdoor-threat\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">75<\/span> <span class=\"visually-hidden\"> with 44 posters participating, including story author<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 496:single\/related:8465e0dff4268b25ec1f5adbc2b3c051 --><!-- empty --><\/p>\n<p>Microsoft on Tuesday patched 120 vulnerabilities, two that are notable because they\u2019re under active attack and a third because it fixes a previous patch for a security flaw that allowed attackers to gain a backdoor that persisted even after a machine was updated.<\/p>\n<p>Zero-day vulnerabilities get their name because an affected developer has zero days to release a patch before the security flaw is under attack. Zero-day exploits can be among the most effective because they usually go undetected by antivirus programs, intrusion prevention systems, and other security protections. These types of attacks usually indicate a threat actor of above-average means because of the work and skill required to identify the unknown vulnerability and develop a reliable exploit. Adding to the difficulty: the exploits must bypass defenses developers have spent considerable resources implementing.<\/p>\n<h2>A hacker\u2019s dream: Bypassing code-signing checks<\/h2>\n<p>The first zero-day is present in all supported versions of Windows, including Windows 10 and Server 2019, which security professionals consider two of the world\u2019s most secure operating systems. <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1464\">CVE-2020-1464<\/a> is what Microsoft is calling a Windows Authenticode Signature Spoofing Vulnerability. Hackers who exploit it can sneak their malware onto targeted systems by bypassing a malware defense that uses digital signatures to certify that software is trustworthy.<\/p>\n<p>Authenticode is Microsoft\u2019s in-house code-signing technology for ensuring that an app or driver comes from a known and trusted source and hasn\u2019t been tampered with by anyone else. Because they modify the OS kernel, drivers can be installed on Windows 10 and Server 2019 only when they bear one of these cryptographic signatures. On earlier Windows versions, digital signatures still play an important role in helping AV and other protections to detect malicious wares.<\/p>\n<p>The typical route for attackers to bypass this protection is to sign their malware with a valid certificate stolen from a legitimate provider. The investigation into Stuxnet, the worm that\u2019s widely believed to have targeted Iran\u2019s nuclear program a decade ago, was one of the first times researchers had discovered the tactic being used.<\/p>\n<p>Since then, however, researchers have found that the practice <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/evasive-code-signed-malware-flourished-before-stuxnet-and-still-does\/\">dates back to at least 2003<\/a> and is much more widespread than previously thought. Stolen certificates continue to be a regular occurrence with one of the more recent incidents using a certificate stolen in 2018 from Nfinity Games to sign malware that <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/05\/hackers-infect-multiple-game-developers-with-advanced-malware\/\">infected several Massively Multiplayer Online game makers<\/a> earlier this year.<\/p>\n<p>CVE-2020-1464 made it possible for hackers to achieve the same bypass without the hassle of stealing a valid certificate or worrying it might be revoked. The host of Windows versions affected suggests that the vulnerability has existed for years. Microsoft provided no details about the cause of the vulnerability, how it\u2019s exploited (and by whom), or who the targets are.<\/p>\n<p>Microsoft typically credits the researchers who reported flaws it fixes, but Microsoft\u2019s <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/acknowledgments\">acknowledgment page<\/a> for this month\u2019s Update Tuesday makes no mention at all of CVE-2020-1464. A Microsoft representative said the discovery was made internally through research done at Microsoft.<\/p>\n<h2>IE: As old as it is insecure<\/h2>\n<p>The other zero-day under attack can install malware of an attacker&#8217;s choice when targets view malicious content with Internet Explorer, an ancient browser with an outdated code base that\u2019s vulnerable to all kinds of exploits.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/11\/the-1337est-print-spooler-bug-fixed-in-august-2020s-patch-tuesday\/\">According to security firm Sophos<\/a>, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1380\">CVE-2020-1380<\/a> stems from a use-after-free class of bug that allows attackers to load malicious code into a memory location that has been freed up once its previous contents are no longer in use. The vulnerability resides in the just-in-time compiler of IE\u2019s JavaScript engine.<\/p>\n<p>One way attackers can exploit the flaw is by planting booby-trapped code on a website the target visits. Another method is to embed a malicious ActiveX control in an application or Microsoft Office document that uses the IE rendering engine. Despite being harmful, Windows will show that the ActiveX control is \u201csafe for initialization.\u201d<\/p>\n<p>There\u2019s no doubt that the in-the-wild exploits are alarming to the people or organizations under attack. But all in all, CVE-2020-1380 is less concerning to the Internet as a whole because of the small base of users threatened. With the rise of advanced protections in Chrome, Firefox, and Edge, IE has gone from a browser with near-monopoly usage to one with <a href=\"https:\/\/www.netmarketshare.com\/browser-market-share.aspx?options=%7B%22filter%22%3A%7B%22%24and%22%3A%5B%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Desktop%2Flaptop%22%5D%7D%7D%5D%7D%2C%22dateLabel%22%3A%22Trend%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22browser%22%2C%22sort%22%3A%7B%22share%22%3A-1%7D%2C%22id%22%3A%22browsersDesktop%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart%22%3A%222019-08%22%2C%22dateEnd%22%3A%222020-07%22%2C%22segments%22%3A%22-1000%22%7D\">less than 6% marketshare<\/a>. Anyone still using it should give it up for something with better defenses.<\/p>\n<h2>A \u201cleet\u201d bug with an elusive fix<\/h2>\n<p>The third fix released on Tuesday is <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1337\">CVE-2020-1337<\/a>. Its number, 1337, which hackers often use to spell \u201cleet,\u201d as in \u201celite,\u201d is one noteworthy trait. The more important distinction is that it\u2019s a patch for <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1048\">CVE-2020-1048<\/a>, an update that Microsoft released in May.<\/p>\n<p>The May patch was supposed to fix a privilege escalation vulnerability in the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/printdocs\/print-spooler\">Windows Print Spooler<\/a>, a service that manages the printing process, including locating printer drivers and loading them and scheduling print jobs.<\/p>\n<p>In short, the flaw made it possible for an attacker with the ability to execute low-privileged code to establish a backdoor on vulnerable computers. The attacker could return any time after that to escalate access to all-powerful System rights. The vulnerability was the result of the print spooler allowing an attacker to write arbitrary data to any file on a computer with system privileges. That made it possible to drop a malicious DLL and get it executed by a process running with system privileges.<\/p>\n<p>A detailed technical description of this flaw is provided in <a href=\"https:\/\/windows-internals.com\/printdemon-cve-2020-1048\/\">this post<\/a> from researchers Yarden Shafir&nbsp;and Alex Ionescu. They note that the print spooler has received little attention from researchers, despite being some of the oldest code still running in Windows.<\/p>\n<p>Less than two weeks after Microsoft issued the patch, a researcher with the handle math1as submitted a report to the bug bounty service Zero Day Initiative that showed the update failed to fix the vulnerability. The discovery required Microsoft to develop a new patch. The result is the one that was released on Tuesday. ZDI has a full breakdown of the failed patch <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2020\/8\/11\/windows-print-spooler-patch-bypass-re-enables-persistent-backdoor\">here<\/a>.<\/p>\n<p>In all, this month\u2019s Update Tuesday patched almost three-dozen vulnerabilities rated critical and many more with lower ratings. Within&nbsp;a day or so of release, Windows automatically downloads patches and installs them at times when the computer isn\u2019t in use.<\/p>\n<p>For most people, this automatic update system is fine, but if you\u2019re like me and want to install them right away, that\u2019s easy, too. On Windows 10, go to Start &gt; Settings &gt; Update &amp; Security &gt; Windows Update, and click Check for Updates. On Windows 7, go to Start &gt; Control Panel &gt; System and Security &gt; Windows Update and click Check for Updates. A reboot will be required.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31481\/An-Overview-Of-Microsofts-Recent-Patch-Tuesday.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36579,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5301],"class_list":["post-36578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemicrosoftflawpatch"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>An Overview Of Microsoft&#039;s Recent Patch Tuesday 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Overview Of Microsoft&#039;s Recent Patch Tuesday 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-12T15:52:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"471\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"An Overview Of Microsoft&#8217;s Recent Patch Tuesday\",\"datePublished\":\"2020-08-12T15:52:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/\"},\"wordCount\":1142,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg\",\"keywords\":[\"headline,microsoft,flaw,patch\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/\",\"name\":\"An Overview Of Microsoft's Recent Patch Tuesday 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg\",\"datePublished\":\"2020-08-12T15:52:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg\",\"width\":760,\"height\":471},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,microsoft,flaw,patch\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflawpatch\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An Overview Of Microsoft&#8217;s Recent Patch Tuesday\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Overview Of Microsoft's Recent Patch Tuesday 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/","og_locale":"en_US","og_type":"article","og_title":"An Overview Of Microsoft's Recent Patch Tuesday 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-12T15:52:09+00:00","og_image":[{"width":760,"height":471,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"An Overview Of Microsoft&#8217;s Recent Patch Tuesday","datePublished":"2020-08-12T15:52:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/"},"wordCount":1142,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg","keywords":["headline,microsoft,flaw,patch"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/","url":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/","name":"An Overview Of Microsoft's Recent Patch Tuesday 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg","datePublished":"2020-08-12T15:52:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/an-overview-of-microsofts-recent-patch-tuesday.jpg","width":760,"height":471},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/an-overview-of-microsofts-recent-patch-tuesday\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,microsoft,flaw,patch","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflawpatch\/"},{"@type":"ListItem","position":3,"name":"An Overview Of Microsoft&#8217;s Recent Patch Tuesday"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36578"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36579"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}