Windows

New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)

New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)

A significant evolution in the cybersecurity landscape has emerged with the uncovering of new vulnerabilities in Windows 11 (24H2). Process…

2 months ago
Windows Policy Loophole Let Hackers to Install Malicious Kernel Mode DriversWindows Policy Loophole Let Hackers to Install Malicious Kernel Mode Drivers

Windows Policy Loophole Let Hackers to Install Malicious Kernel Mode Drivers

Microsoft blocked code signing certs, favored by Chinese hackers and devs, for loading malicious kernel mode drivers via Windows policy…

2 years ago
RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable EndpointsRCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services enables RDP Protocol let attackers compromise the vulnerable system with…

2 years ago
Operating Systems Can be Detected Using Ping CommandOperating Systems Can be Detected Using Ping Command

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the…

2 years ago
Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux SystemsChinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems

Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems

It has been reported by the Recorded Future’s Insikt Group that RedGolf, a Chinese state-sponsored threat actor group, was using…

2 years ago
Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard ContentsChrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents

Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents

In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts at Avast, a Windows malware…

2 years ago
An Unofficial Patch Has Been Released for Actively Exploited Windows MoTW Zero-DayAn Unofficial Patch Has Been Released for Actively Exploited Windows MoTW Zero-Day

An Unofficial Patch Has Been Released for Actively Exploited Windows MoTW Zero-Day

There is an unofficial patch from 0patch for a Zero-Day flaw in Microsoft Windows that allows bypassing the MotW (Mark-of-the-Web)…

2 years ago
SMBleed – Windows SMB Protocol Bug Let Hackers Leak Kernel Memory & Execute a Code RemotelySMBleed – Windows SMB Protocol Bug Let Hackers Leak Kernel Memory & Execute a Code Remotely

SMBleed – Windows SMB Protocol Bug Let Hackers Leak Kernel Memory & Execute a Code Remotely

Researchers uncovered a critical bug names as "SMBleed" in the Microsoft Server Message Block (SMB) network communication protocol. This security…

5 years ago
Blue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy cryptocurrency-mining MalwareBlue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy cryptocurrency-mining Malware

Blue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy cryptocurrency-mining Malware

Security researchers from Red Canary discovered potential hacker group Blue Mockingbirddeploying Monero cryptocurrency-mining payloads deployed on the Internet-facing Windows machines…

5 years ago
Researchers Disclose Five Windows Zero-day Vulnerabilities that Allow Hackers to Escalate PrivilegesResearchers Disclose Five Windows Zero-day Vulnerabilities that Allow Hackers to Escalate Privileges

Researchers Disclose Five Windows Zero-day Vulnerabilities that Allow Hackers to Escalate Privileges

Security researchers from Trend Micro’s Zero Day Initiative (ZDI) disclosed five zero-day vulnerabilities that allow attackers to escalate the privileges…

5 years ago