Monday, April 28, 2025
HomeData BreachNew Windows 10 Update System vulnerable to Hack with Critical security Flow

New Windows 10 Update System vulnerable to Hack with Critical security Flow

Published on

SIEM as a Service

Follow Us on Google News

The most recent adaptation of the Microsoft OS has gotten to be at the end of the day a point of examination, and this time it might convey terrible news for your organization’s security.

As the cybersecurity Expert Sami Laiho uncovered on his blog, each Windows 10 redesign represents a genuine hazard. Specifically, while your framework redesigns, anybody can take control of your corporate PCs.

This is a major issue and it has been there for quite a while,” clarifies Laiho. This genuine defect becomes possibly the most important factor when the OS restarts in the wake of introducing another redesign.

- Advertisement - Google News

Once the framework is being redesigned, all you have to do to pick up control of it is to push Shift-F10 to get to the summon Gain access with administrator level Privilege .

In light of this, the perils that your organization appearances are multifaceted. In reality, any worker can take control of their PC as manager, get to secret reports, or get to the corporate system and make a difficult issue from inside the organization itself.

Laiho brings up that it is not important to utilize a particular programming to complete this cyberattack. Simply that guiltless blend of keys is sufficient to sow tumult.

As though that wasn’t sufficient, the danger is not restricted to the individuals who have physical access to the PC: “An outside risk having admittance to a PC sits tight for it to begin a move up to get into the framework,” clarifies Laiho.

Microsoft is evidently attempting to settle this genuine defect. Then, the most vital thing to forestall dangers is to depend on a satisfactory security arrangement, and not to put off Windows 10’s dull redesigns.

Disregard to what extent the upgrade takes. In a perfect world you would approve it quickly and remain with the PC at all circumstances.

This is the best way to make certain that no spectators take the driver’s seat of your PC. It is clearly imperative to disclose this to representatives.

Meanwhile, we’ll need to trust that they won’t lay hold of the framework themselves and sit tight for Microsoft to determine this basic weakness.

Why would a bad guy do this:

  1. An internal threat who wants to get admin access just has to wait for the next upgrade or convince it’s OK for him to be an insider
  2. An external threat having access to a computer waits for it to start an upgrade to get into the system

How to prevent:

  • Don’t allow unattended upgrades
  • Keep very tight watch on the Insiders
  • Stick to LTSB version of Windows 10 for now
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where...