Protection against phishing, malware, and other threats targeting email and collaboration tools in Microsoft 365
It should have been repaired with definition update:
1.449.430.0
I am with Windows defender on:
1.449.508.0
Also have a look at:
...
Microsoft moved quickly to push Defender detections to protect customers from malware signed with the compromised certificates. The detection logic it deployed was too broad. It caught the legitimate DigiCert root CAs alongside the revoked code-signing certificates, triggering quarantine actions on Windows systems that had done nothing wrong. "Earlier today we determined false positive alerts were mistakenly triggered and updated the alert logic," Microsoft told BleepingComputer. The fix shipped in Security Intelligence update 1.449.430.0. Systems that applied the update automatically had their certificates restored. Admins in environments with restricted update policies had to verify restoration manually using certutil -store AuthRoot | findstr -i "digicert".
....