February’s Patch Tuesday brought 12 security bulletins, five of which Microsoft rated critical Credit: Microsoft Microsoft released its second batch of security updates for this year, addressing a total of 36 flaws in Internet Explorer, Edge, Office, Windows and .NET Framework.The patches are covered in 12 security bulletins, five of which are rated critical. There is also a thirteenth bulletin, also critical, for Flash Player. Although it’s maintained by Adobe, Flash Player is included with Internet Explorer 11 and Edge, so Microsoft is distributing Adobe’s patches through Windows Update.Researchers from security vendor Qualys believe that MS16-022, the Flash Player bulletin, should be at the top of users’ priority list this month because it contains fixes for 22 critical vulnerabilities that could give attackers complete control over computers. Flash Player is a frequent target for attackers and can be exploited by simply visiting a malicious or compromised website.Next on Qualys’ list is MS16-015, which covers patches for seven vulnerabilities in Microsoft Word, Excel and Sharepoint. Three of these vulnerabilities stem from the handling of the RTF file format and can be exploited without user interaction by displaying specially crafted files in the Outlook preview pane. The MS16-009 and MS16-011 for Internet Explorer and Microsoft Edge respectively should come next because they fix critical vulnerabilities that can be exploited through Web pages.Since last month Microsoft has stopped support for some versions of Internet Explorer on certain versions of Windows. For example, Windows 7 and 8.1 will only get updates for IE 11, while IE 9 will only continue to be supported on Windows Vista and Windows Server 2008. Similarly, IE 10 will only be supported on Windows Server 2012. Users should make sure that they’re not using one of the no longer supported IE versions for their OS, because they risk falling behind on critical security patches, like the ones released this month.The last two critical bulletins are MS16-013, which fixes a remote code execution in the Windows Journal component, and MS16-012, which covers patches for two flaws in Microsoft’s PDF Reader which is bundled with Windows 8.1, 10 and Server 2012.PDF readers have historically been a source of many vulnerabilities, but this is the first patch for Microsoft’s implementation. It will be interesting to see how many more flaws security researchers will be able to find in this component in the future, said Wolfgang Kandek, CTO at Qualys, in a blog post.Users of other browsers on Windows, such as Firefox, should obtain the latest version of Flash Player directly from Adobe Systems. Aside from Flash Player patches, the company has also released security patches Tuesday for Photoshop CC and Bridge CC, Adobe Experience Manager and Adobe Connect. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Regulation Regulation news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe