If you are running a windows based PC but have not yet edited your registry to stop your computer being exploited from MSDT Zero Day exploit this important information will be most relevant to you.
The remote code execution flaw is in the Microsoft Windows Support Diagnostic Tool (MSDT) and tracked as CVE-2022-30190, it impacts all Windows clients and server platforms still receiving security updates (Windows 7 up to Windows 11) and Windows Server 2008 or later).
Currently, there is no Microsoft patch to fix the issue. You can block attacks exploiting CVE-2022-30190 by disabling the MSDT URL protocol by editing the registry of the computer. If you are already a subscriber to our basic level security package* your system will already be protected.
If you have any concerns or you would like to engage us to edit your registry to protect your system or upgrade to our basic security package, please phone or message Kelly on 0429 727 091
*This is the next level up from our antivirus only package