{"id":50332,"date":"2023-01-30T12:38:24","date_gmt":"2023-01-30T12:38:24","guid":{"rendered":"http:\/\/57ab8e2c-436d-4b86-9568-4bc7a8238b72"},"modified":"2023-01-30T12:38:24","modified_gmt":"2023-01-30T12:38:24","slug":"microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/","title":{"rendered":"Microsoft warning: Protect this critical piece of your tech infrastructure"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fd7ee99b59b1ac510a271af20ca33a74dc43890d\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=768\" alt=\"data-center-working\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4ec7e655cefac09b2d7571b07f953028e424a6bf\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1024\" alt=\"data-center-working\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280\" alt=\"data-center-working\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280\" alt=\"data-center-working\" width=\"1280\" height=\"853.7358490566038\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty Images<\/span><\/figcaption><\/figure>\n<p>Microsoft is telling customers to apply its latest updates to shield Exchange Server from hackers that keep targeting the platform to access corporate mailboxes and nab company address books for phishing.&nbsp;<\/p>\n<p>&#8220;Attackers looking to exploit unpatched Exchange servers are not going to go away,&#8221; Microsoft&#8217;s Exchange team <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/protect-your-exchange-servers\/ba-p\/3726001\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">warns in an update<\/a>.&nbsp;<\/p>\n<p>&#8220;We know that keeping your Exchange environment protected is critical, and we know it&#8217;s never ending,&#8221; it added.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/how-to-tighten-your-security-in-microsoft-edge\/\" rel=\"follow\">How to tighten your security in Microsoft Edge<\/a><\/strong><\/p>\n<p>The warning from Redmond follows the Cybersecurity and Infrastructure Security Agency (CISA) earlier this month,&nbsp;<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ordering federal agencies to patch<\/a> the Exchange bug <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-41080\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CVE-2022-41080<\/a>.&nbsp;<\/p>\n<p>Microsoft released an <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41080\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">update for the elevation of privilege flaw<\/a> in November, and researchers at CrowdStrike later <a href=\"https:\/\/www.crowdstrike.com\/blog\/owassrf-exploit-analysis-and-recommendations\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">found<\/a> that attackers had combined it with CVE-2022-41082 &#8212; one of the ProxyNotShell pair of bugs &#8212; to achieve remote code execution. &nbsp;<\/p>\n<p>Unpatched Exchange Server is a popular target because of the value of mailboxes and the fact that Exchange Server contains a copy of the company address book, which is useful for subsequent phishing attacks, Microsoft notes. Additionally, Exchange has &#8220;deep hooks&#8221; into permissions within Active Directory, and, in a hybrid environment, also gives an attacker access to the connected cloud environment.&nbsp;<\/p>\n<p>To defend your Exchange servers against attacks that exploit known vulnerabilities, you &#8220;<em>must&#8221;<\/em> install the latest supported cumulative update (CU), which is <a href=\"https:\/\/www.microsoft.com\/download\/details.aspx?familyID=a149e06c-62f4-4b62-adf8-7d382223a239\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CU12 for Exchange Server 2019<\/a>, <a href=\"https:\/\/www.microsoft.com\/download\/details.aspx?familyID=ad395419-4d2f-4eb0-97fb-a5b88ab814e1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CU23 for Exchange Server 2016<\/a>, and <a href=\"https:\/\/www.microsoft.com\/download\/details.aspx?id=58392\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CU23 for Exchange Server 2013<\/a>, and the latest security update (SU), which is the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-january-2023-exchange-server-security-updates\/ba-p\/3711808\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">January 2023 SU<\/a>, Microsoft says.&nbsp;<\/p>\n<p>Admins only need to install the latest Exchange Server CUs and SU because they&#8217;re cumulative updates. However, it recommends installing the latest CU and then checking to see if any SUs were released after the CU was released.&nbsp;<\/p>\n<p>Exchange Server came into focus in early 2021 after Microsoft patched four zero-day flaws, known as ProxyShell, which were exploited by China-backed, state-sponsored attackers. It was the <a href=\"https:\/\/googleprojectzero.blogspot.com\/2022\/04\/the-more-you-know-more-you-know-you.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">first time<\/a> Google Project Zero had seen Exchange Server zero days detected since it began tracking them in 2014. &nbsp; &nbsp;<\/p>\n<p>Microsoft is advising admins to always run <a href=\"https:\/\/aka.ms\/ExchangeHealthChecker\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Health Checker<\/a> after installing an update to check for manual tasks required after the update. Health Checker provides links to step-by-step guidance.<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/home-and-office\/work-life\/cybersecurity-staff-are-struggling-heres-how-to-support-them-better\/\" rel=\"follow\"><strong>Cybersecurity staff are struggling. Here&#8217;s how to support them better<\/strong><\/a><\/p>\n<p>The tech giant also notes that it may release a mitigation for a known vulnerability ahead of releasing an SU. The automatically applied option is the <a href=\"https:\/\/learn.microsoft.com\/exchange\/exchange-emergency-mitigation-service?view=exchserver-2019\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Exchange Emergency Mitigation Service<\/a>, and a manual option is the <a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Security\/EOMT\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Exchange On-Premises Mitigation Tool<\/a>.&nbsp;<\/p>\n<div id=\"pinbox-57ab8e2c-436d-4b86-9568-4bc7a8238b72\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">More Microsoft<\/h4>\n<p> <!----> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft warns admins to keep Exchange Server updated as the platform is constantly being targeted by attackers.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-50332","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft warning: Protect this critical piece of your tech infrastructure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft warning: Protect this critical piece of your tech infrastructure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-30T12:38:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft warning: Protect this critical piece of your tech infrastructure\",\"datePublished\":\"2023-01-30T12:38:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/\"},\"wordCount\":448,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/329007a90c395b52eb59046eec885affe9b4d23e\\\/2023\\\/01\\\/30\\\/d76cb032-b591-4de4-a63c-cff8491e780e\\\/data-center-working.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/\",\"name\":\"Microsoft warning: Protect this critical piece of your tech infrastructure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/329007a90c395b52eb59046eec885affe9b4d23e\\\/2023\\\/01\\\/30\\\/d76cb032-b591-4de4-a63c-cff8491e780e\\\/data-center-working.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-01-30T12:38:24+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/329007a90c395b52eb59046eec885affe9b4d23e\\\/2023\\\/01\\\/30\\\/d76cb032-b591-4de4-a63c-cff8491e780e\\\/data-center-working.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/329007a90c395b52eb59046eec885affe9b4d23e\\\/2023\\\/01\\\/30\\\/d76cb032-b591-4de4-a63c-cff8491e780e\\\/data-center-working.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft warning: Protect this critical piece of your tech infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft warning: Protect this critical piece of your tech infrastructure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft warning: Protect this critical piece of your tech infrastructure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-01-30T12:38:24+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft warning: Protect this critical piece of your tech infrastructure","datePublished":"2023-01-30T12:38:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/"},"wordCount":448,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/","name":"Microsoft warning: Protect this critical piece of your tech infrastructure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280","datePublished":"2023-01-30T12:38:24+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/329007a90c395b52eb59046eec885affe9b4d23e\/2023\/01\/30\/d76cb032-b591-4de4-a63c-cff8491e780e\/data-center-working.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-warning-protect-this-critical-piece-of-your-tech-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft warning: Protect this critical piece of your tech infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50332"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50332\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}