Gulf News
المملكة: “Very high” security warning in Microsoft software

The National Cybersecurity Guidance Center issued a security warning about security vulnerabilities in Microsoft products.
He stressed in his warning that the warning level for the vulnerabilities is “very high.”
The center called for the need to update the products, as Microsoft issued an explanation of the updates via this link.
He stressed in his warning that the warning level for the vulnerabilities is “very high.”
The center called for the need to update the products, as Microsoft issued an explanation of the updates via this link.
The National Guidance Center for Cybersecurity is the competent authority in the Kingdom in cybersecurity, and the national reference in its affairs, and aims to strengthen it in order to protect the vital interests of the state, its national security, sensitive infrastructure, priority sectors, and government services and activities..
This does not absolve any public, private, or other entity of its responsibility regarding its cybersecurity, in a manner that does not conflict with the authority’s powers and tasks contained in its organization..
It is professional in protecting networks, information technology systems, operational technology systems, and their hardware and software components, the services they provide, and the data they contain, from any penetration, disruption, modification, entry, use, or illegal exploitation. This concept also includes information security, electronic security, and security. Digital and so on.
This does not absolve any public, private, or other entity of its responsibility regarding its cybersecurity, in a manner that does not conflict with the authority’s powers and tasks contained in its organization..
It is professional in protecting networks, information technology systems, operational technology systems, and their hardware and software components, the services they provide, and the data they contain, from any penetration, disruption, modification, entry, use, or illegal exploitation. This concept also includes information security, electronic security, and security. Digital and so on.
- For more: Follow Khaleejion 24 Arabic, Khaleejion 24 English, Khaleejion 24 Live, and for social media follow us on Facebook and Twitter
Follow Us