windows

  1. Father

    The GOOSEGG malware is distributed through a breach in Windows Print Spooler

    The cybercrime group Fancy Bear, which in the West is associated with Russia, took advantage of a vulnerability in the Windows print service component to load a previously unknown malware into the system — goosegg. This malware has been active since June 2020 and uses an already fixed bug that...
  2. Father

    Российская компания APT28 воспользовалась ошибкой диспетчера очереди печати Windows для развертывания вредоносного ПО "GooseEgg"

    Связанный с Россией субъект угрозы национальному государству, отслеживаемый как APT28, использовал уязвимость системы безопасности в компоненте диспетчера очереди печати Microsoft Windows для доставки ранее неизвестного пользовательского вредоносного ПО под названием GooseEgg. Инструмент для...
  3. Father

    APT29 attacks Windows users through a loophole in the Print Queue Manager

    It turns out that Microsoft's proprietary tool can not only hang... Over the past few years, security experts have observed an increase in cyber attacks on organizations in Eastern and Western Europe, as well as North America. The reason for this is hackers from the APT29 group, who actively...
  4. Father

    Исследователи выявляют недостатки Windows, предоставляющие хакерам полномочия, подобные руткитам

    Новое исследование показало, что процесс преобразования пути DOS в NT может быть использован злоумышленниками для получения руткит-подобных возможностей для сокрытия файлов, каталогов и процессов и олицетворения их личности. "Когда пользователь выполняет функцию, у которой есть аргумент path в...
  5. Father

    MagicDot: A long-standing Windows issue gives Hackers Rootkit Powers

    The SafeBreach study reveals serious risks in converting file paths. A new study has found vulnerabilities in the process of converting DOS to NT paths in the Windows operating system, which can allow attackers to hide files, mimic directories and processes, acquiring capabilities similar to...
  6. Father

    MagicDot vulnerabilities in Windows open the way for rootkits

    Incorrect DOS paths in the file name nomenclature in Windows can be used to hide malicious content, files, and processes. A researcher from SafeBreach, Or Yair, identified a problem related to the process of converting a DOS path to NT format in Windows. Attackers gain rootkit capabilities to...
  7. Father

    Windows fibers allow you to execute malicious shellcode unnoticed by EDR

    At the Black Hat Asia conference held in Singapore, two new ways to use Windows fibers to execute malicious code were presented. One of them, Poison Fiber, allows attacks to be carried out remotely. Both PoC's are authored by independent information security researcher Daniel Jary. According to...
  8. Father

    The era of Windows 10 is coming to an end: Microsoft includes a forced mode

    The company uses full-screen banners to remind you about the transition to Windows 11. Microsoft is actively encouraging users to upgrade to Windows 11, as official support for Windows 10 expires in October 2025. The company started displaying full-screen banners with a reminder about this...
  9. Father

    Критическая уязвимость Rust "BatBadBut" подвергает системы Windows атакам

    Критический недостаток безопасности в стандартной библиотеке Rust может быть использован для нацеливания на пользователей Windows и организации атак с использованием командного ввода. Уязвимость, отслеживаемая как CVE-2024-24576, имеет оценку CVSS 10.0, что указывает на максимальную...
  10. Father

    CVE-2024-24576: Rust caused remote Windows hijacking

    A vulnerability in popular programming languages allows hackers to remotely inject code into the system. A vulnerability has been discovered in the standard library of the Rust programming language that allows malicious code to be executed on Windows. CVE-2024-24576 (CVSS score: 10) is related...
  11. Father

    Microsoft's Fateful Update: Windows Now decides which browser to use

    Microsoft uses clever methods to promote Edge. In the February updates of Windows 10 (KB5034763) and Windows 11 (KB5034765), Microsoft introduced an innovation that caused discussions among users and IT professionals. The company has implemented a Windows driver that prevents changes to the...
  12. Father

    Обнаружение вредоносных программ на базе Windows с помощью улучшения видимости

    Несмотря на множество доступных решений для обеспечения безопасности, все больше организаций становятся жертвами программ-вымогателей и других угроз. Эти продолжающиеся угрозы - это не просто неудобство, от которого страдают предприятия и конечные пользователи, они наносят ущерб экономике...
  13. Teacher

    Samba 4.20: Fully compatible with Windows 11 and Active Directory

    The Samba development team has announced the first stable release of the 4.20 series. The Samba development team has announced the first stable release of the 4.20 series, which includes significant updates and improvements. The release enhances the functionality of Samba as a full-fledged...
  14. Teacher

    Farewell to Intel, AMD and Windows: China chooses its own path

    China's state structures: why do we need Western technologies if we have our own? China is gradually abandoning the use of Intel and AMD chips, the Windows operating system, and foreign databases in favor of domestic alternatives. The requirements mainly relate to computers and servers owned by...
  15. Teacher

    Hackers broke into Windows 11, Tesla and Ubuntu: Grand Prix on the first day of Pwn2Own

    Specialists managed to uncover 19 zero-day vulnerabilities and win cash prizes. On the first day of the Pwn2Own competition in Vancouver in 2024, participants demonstrated 19 zero-day vulnerabilities in Windows 11, Tesla cars, and Ubuntu. For their findings, experts received awards totaling...
  16. Teacher

    Zorin OS 17.1: indistinguishable from Windows OS gives new life to old technology

    3 work environment options and built-in applications offer you to learn and work comfortably. Zorin, the developer of the Linux distribution Zorin OS, aimed at inexperienced users, announced the release of Zorin OS 17.1, which offers 3 working environment options depending on your needs. Zorin...
  17. Teacher

    Microsoft inserts pop-up ads in Google Chrome on Windows

    How to protect your choice and avoid unwanted changes. Microsoft has again decided to use pop-up windows in the Google Chrome browser, the purpose of which is to encourage users to switch to the Bing search engine. For the first time, such advertising notifications that resemble the actions of...
  18. Teacher

    Bypassing Windows Protection: RedCurl turns PCA into a spying tool

    How Windows Assistant became the hackers command center. Trend Micro revealed new methods of cyberattacks by the RedCurl group, which uses a legitimate Windows component to execute malicious commands. The Program Compatibility Assistant ( PCA) component, designed to solve compatibility...
  19. Teacher

    Windows users, beware: DarkGate exploits a zero-day vulnerability

    The SmartScreen security bug served hackers well. Maybe you also managed to become a victim of it? In mid-January, security researchers noticed a new large-scale campaign to distribute malicious software DarkGate, exploiting a recently fixed vulnerability in the Microsoft Windows security...
  20. Teacher

    Группа киберпреступности RedCurl злоупотребляет инструментом Windows PCA для корпоративного шпионажа

    Русскоязычная киберпреступная группа под названием RedCurl использует законный компонент Microsoft Windows под названием Program Compatibility Assistant (PCA) для выполнения вредоносных команд. "Служба помощника по совместимости программ (pcalua.exe) - это служба Windows, предназначенная для...
Top