Windows

Windows Policy Loophole Let Hackers to Install Malicious Kernel Mode Drivers

Microsoft blocked code signing certs, favored by Chinese hackers and devs, for loading malicious kernel mode drivers via Windows policy…

1 year ago

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services enables RDP Protocol let attackers compromise the vulnerable system with…

1 year ago

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the…

1 year ago

Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems

It has been reported by the Recorded Future’s Insikt Group that RedGolf, a Chinese state-sponsored threat actor group, was using…

2 years ago

Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents

In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts at Avast, a Windows malware…

2 years ago

An Unofficial Patch Has Been Released for Actively Exploited Windows MoTW Zero-Day

There is an unofficial patch from 0patch for a Zero-Day flaw in Microsoft Windows that allows bypassing the MotW (Mark-of-the-Web)…

2 years ago

SMBleed – Windows SMB Protocol Bug Let Hackers Leak Kernel Memory & Execute a Code Remotely

Researchers uncovered a critical bug names as "SMBleed" in the Microsoft Server Message Block (SMB) network communication protocol. This security…

4 years ago

Blue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy cryptocurrency-mining Malware

Security researchers from Red Canary discovered potential hacker group Blue Mockingbirddeploying Monero cryptocurrency-mining payloads deployed on the Internet-facing Windows machines…

4 years ago

Researchers Disclose Five Windows Zero-day Vulnerabilities that Allow Hackers to Escalate Privileges

Security researchers from Trend Micro’s Zero Day Initiative (ZDI) disclosed five zero-day vulnerabilities that allow attackers to escalate the privileges…

5 years ago

Top 11 Best Android Emulators for Windows – 2020

Android emulator comes for free, but there is a number of options available on the web, not all of them…

5 years ago