Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Denver news in your inbox
Catch up on the most important stories affecting your hometown with Axios Denver
Des Moines news in your inbox
Catch up on the most important stories affecting your hometown with Axios Des Moines
Minneapolis-St. Paul news in your inbox
Catch up on the most important stories affecting your hometown with Axios Twin Cities
Tampa Bay news in your inbox
Catch up on the most important stories affecting your hometown with Axios Tampa Bay
Charlotte news in your inbox
Catch up on the most important stories affecting your hometown with Axios Charlotte
Photo: Omar Marques/SOPA Images/LightRocket via Getty Images
Kaspersky Lab uncovered a new zero-day, or cyber vulnerability, in August in the Microsoft Windows operating system which Microsoft patched this Tuesday after Kaspersky notified the company.
Why it matters: The cyber espionage group "FruityArmor," which is likely responsible for this zero-day, has slowly been ramping up activity over the past two years, Kaspersky assesses.
The details: Kaspersky links FruityArmor with this vulnerability since the group has previously used the same backdoor that ran the exploit in Microsoft's operating system most recently. The attack was “highly targeted” against victims located in the Middle East, per Kaspersky Lab, and was delivered by a PowerShell backdoor.