Archive for the ‘windows Vulnerability’ Category
Update — With this month's patch Tuesday updates, Microsoft has finally addressed this vulnerability, tracked as CVE-2019-1162, by correcting how the Windows operating system handles calls to Advanced Local Procedure Call (ALPC).
A Google security researcher has just disclosed details of a 20-year-old unpatched high-severity vulnerability affecting all versions of Microsoft Windows, back
Posted in google, Google Project Zero, hacking news, hacking windows password, microsoft, Vulnerability, windows Vulnerability, Windows zero-day vulnerability | Comments (0)
Cybersecurity researchers have discovered a new variant of WatchBog, a Linux-based cryptocurrency mining malware botnet, which now also includes a module to scan the Internet for Windows RDP servers vulnerable to the Bluekeep flaw.
BlueKeep is a highly-critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Services that could allow an unauthenticated remote
Posted in BlueKeep RDP Flaw, BlueKeep RDP Vulnerability, BlueKeep Vulnerability, botnet malware, cryptocurrency malware, hacking news, Linux botnet, Linux Vulnerability, malware, windows Vulnerability | Comments (0)
After Adobe, the technology giant Microsoft today—on June 2019 Patch Tuesday—also released its monthly batch of software security updates for various supported versions of Windows operating systems and other Microsoft products.
This month's security updates include patches for a total of 88 vulnerabilities, 21 are rated Critical, 66 are Important, and one is rated Moderate in severity.
Posted in cyber security, microsoft, Microsoft Patch Tuesday, windows updates, windows Vulnerability | Comments (0)
Less than 24 hours after publicly disclosing an unpatched zero-day vulnerability in Windows 10, the anonymous hacker going by online alias "SandboxEscaper" has now dropped new exploits for two more unpatched Microsoft zero-day vulnerabilities.
The two new zero-day vulnerabilities affect Microsoft's Windows Error Reporting service and Internet Explorer 11.
Just yesterday, while releasing a
Posted in cyber security, hacking news, Internet Explorer, microsoft, sandbox bypass, windows security, windows Vulnerability, Windows zero-day vulnerability, Zero-Day Vulnerability | Comments (0)
In a shocking revelation, it turns out that a hacking group believed to be sponsored by Chinese intelligence had been using some of the zero-day exploits linked to the NSA's Equation Group almost a year before the mysterious Shadow Brokers group leaked them.
According to a new report published by cybersecurity firm Symantec, a Chinese-linked group, which it calls Buckeye, was using the
Posted in APT3, buckeye, DoublePulsar, EternalBlue exploit, EternalRomance, EternalSynergy, nsa hacking tools, The Shadow Brokers, windows exploit, windows Vulnerability, zero-day exploit | Comments (0)
A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system that, under a certain scenario, could allow a remote attacker to execute arbitrary code on Windows machine.
Discovered by security researcher John Page (@hyp3rlinx), the vulnerability was reported to the Microsoft security team through Trend Micro's Zero Day Initiative (ZDI) Program over 6
Posted in cyber security, hacking news, vCard exploit, Vulnerability, windows hacking, windows security, windows Vulnerability, Zero-Day Vulnerability | Comments (0)
As part of this month’s Patch Tuesday, Microsoft has released security patches for a serious privilege escalation vulnerability which affect all versions of its Windows operating system for enterprises released since 2007.
Researchers at behavioral firewall specialist Preempt discovered two zero-day vulnerabilities in Windows NTLM security protocols, both of which allow attackers to create a
Posted in hacking news, Microsoft Windows, privilege escalation, RDP exploit, RDP server hacking, Vulnerability, windows hacking, windows Vulnerability, zero-day exploit | Comments (0)
Attackers can leverage a design weakness in all versions of Windows to carry out code injection attacks that bypass detection by security software.
Posted in atom table, atombombing, Code Injection, Web Security, windows Vulnerability | Comments (0)