CVE/vulnerability
Lazarus Hacker Group Exploited Microsoft Windows Zero-day
The notorious Lazarus hacker group has been identified as exploiting a zero-day vulnerability in Microsoft Windows, specifically targeting the Windows Ancillary Function Driver for...
cyber security
BeaverTail Malware Attacking Windows Users Via Weaponized Games
Researchers uncovered a new malware campaign dubbed BeaverTail, a North Korean cyber espionage malware family primarily focusing on job seekers.Initially identified as a JavaScript-based...
cyber security
CrowdStrike Update Triggers Widespread Windows BSOD Crashes
A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users, leading to widespread reports of Blue Screen of Death (BSOD)...
Cyber Security News
Microsoft Windows Ntqueryinformationtoken Flaw Let Attackers Escalate Privileges
Microsoft has disclosed a critical vulnerability identified as CVE-2024-30088.With a CVSS score of 8.8, this flaw affects Microsoft Windows and allows local attackers to escalate their privileges on affected installations.CVE-2024-30088 -Vulnerability DetailsThe vulnerability...
cyber security
256,000+ Publicly Exposed Windows Servers Vulnerable to MSMQ RCE Flaw
Cybersecurity watchdog Shadowserver has identified 256,000+ publicly exposed servers vulnerable to a critical Remote Code Execution (RCE) flaw in Microsoft Message Queuing (MSMQ) services....
cyber security
Weaponized Windows Shortcut Files Deploying Fileless RokRat Malware
Hackers target LNK (Windows shortcut) files to disseminate malware because they can embed malicious code that automatically executes when the shortcut is clicked. LNK files...
Chrome
Google Guide! How to Detect Browser Data Theft Using Windows Event Logs
In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from malicious actors. In a recent blog post, the tech giant...
cyber security
Critical Rust Vulnerability Let Hackers Inject Commands on Windows Systems
A new critical vulnerability has been discovered in two of the Rust standard libraries, which could allow a threat actor to execute shell commands...