CERT/CC Releases Information on Critical Vulnerability in Microsoft Windows Netlogon Remote Protocol September 17, 2020 https://us-cert.cisa.gov/ncas/curre...-information-critical-vulnerability-microsoft A Proof of Concept Exploit for the “Windows Zerologon” Flaw is Out
CISA Releases Emergency Directive on Microsoft Windows Netlogon Remote Protocol September 18, 2020 https://us-cert.cisa.gov/ncas/curre...mergency-directive-microsoft-windows-netlogon
ACSC Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) September 22, 2020 https://www.cyber.gov.au/acsc/view-...evation-privilege-vulnerability-cve-2020-1472
Microsoft clarifies patch confusion for Windows Zerologon flaw September 29, 2020 https://www.bleepingcomputer.com/ne...s-patch-confusion-for-windows-zerologon-flaw/
Ransomware gang now using critical Windows flaw in attacks October 9, 2020 https://www.bleepingcomputer.com/ne...g-now-using-critical-windows-flaw-in-attacks/
Election Systems Under Attack via Microsoft Zerologon Exploits https://threatpost.com/election-systems-attack-microsoft-zerologon/
Microsoft Warns of Continued Exploitation of CVE-2020-1472 October 29, 2020 https://us-cert.cisa.gov/ncas/curre...ft-warns-continued-exploitation-cve-2020-1472
Microsoft Defender for Identity now detects Zerologon attacks November 30, 2020 https://www.bleepingcomputer.com/ne...r-for-identity-now-detects-zerologon-attacks/
Microsoft Implements Windows Zerologon Flaw ‘Enforcement Mode’ Starting Feb. 9, Microsoft will enable Domain Controller “enforcement mode” by default to address CVE-2020-1472. January 15, 2021 https://threatpost.com/microsoft-implements-windows-zerologon-flaw-enforcement-mode/163104/