The article discusses a vulnerability known as “bitpixie” that allows attackers to access encrypted files on Windows devices using BitLocker without needing to disassemble the device. This exploit takes advantage of a bug in the Windows Boot Manager and requires only physical access to the device and a network connection.…
Read More
Tag: WINDOWS
Recent reports indicate unauthorized access in Japan, primarily using LinkedIn as an infection vector. The Lazarus attack group has been identified as responsible for these attacks, which have targeted organizations since 2019. Recommendations include restricting the use of social networking services on work devices. Affected: LinkedIn, Bitcoin.DMM.com…
Read More
Virtual machines serve as crucial tools for malware analysis, allowing analysts to safely examine malicious code. However, sophisticated malware employs various techniques to detect virtual environments, prompting the need for enhanced security measures to protect against such threats. Affected: malware analysts, cybersecurity sector
Read More
Keypoints :
Virtual machines provide a safe environment for malware analysis.…
This article analyzes the Clickfix phishing incidents, highlighting the evolution of CAPTCHA bypass techniques and the exploitation of user trust in verification mechanisms. It details how attackers use social engineering to manipulate users into executing malicious commands, leading to data theft. Affected: Windows system users, WordPress websites, online security sector
Read More
Keypoints :
Clickfix is a phishing technique that exploits user fatigue with verification processes.…
Summary: Microsoft has addressed a critical bug affecting Windows Server 2022 systems with multiple NUMA nodes that prevented them from starting up. The update includes a servicing stack update to enhance the reliability of the update process. This follows previous fixes for boot issues in Windows Server 2019 and Windows Server 2025, highlighting ongoing efforts to improve system stability.…
Read More
Summary: Security researcher MrAle_98 has disclosed a proof-of-concept exploit for a zero-day vulnerability, CVE-2024-49138, affecting the Windows Common Log File System (CLFS) Driver. This elevation of privilege flaw, with a CVSS score of 7.8, allows attackers to gain SYSTEM privileges on affected devices. Microsoft confirmed that the vulnerability was actively exploited before a patch was released, emphasizing the urgency for users to update their systems.…
Read More
Summary: Microsoft has acknowledged a crashing issue in classic Outlook that affects users after an update, causing error codes “0xc0000005”. A temporary fix is available by reverting to a previous version until a permanent solution is released on January 28. The company has also been addressing other Outlook-related issues in recent months.…
Read More
Summary: The video discusses the use of a powerful open-source tool called “It Box” that can be used for malware scanning and analysis. It highlights the features of this tool, including static and dynamic analysis capabilities, the ability to scan running processes, and integrating multiple tools to detect potential threats in malware.…
Read More
The Lynx ransomware, identified as a successor to the INC ransomware family, has been actively targeting various industries in the US and UK since July 2024. Operating under a ransomware-as-a-service model, Lynx employs tactics such as phishing, service termination, and double extortion. The ransomware uses robust encryption methods and has shown a significant overlap with its predecessor, INC.…
Read More
This article discusses the origins and evolution of ransomware, tracing back to the first known instance involving a floppy disk labeled “AIDS Information” sent in 1989. It highlights the impact of ransomware on individuals and organizations, the methods used by cybercriminals, and the ongoing threat posed by such attacks today.…
Read More
GuidePoint Security identified a Python-based backdoor used by a threat actor to maintain access to compromised systems and deploy RansomHub encryptors across the network. The malware employs obfuscation techniques and utilizes Remote Desktop Protocol for lateral movement. Key indicators of compromise and a detailed analysis of the deployment process and command-and-control mechanisms are also discussed.…
Read More
A series of critical vulnerabilities have been reported across various platforms, including Aviatrix Controller and Microsoft 365 applications, leading to significant security risks such as unauthorized access and data breaches. Additionally, a new phishing tactic targeting Apple iMessage users and a malicious PyPi package aimed at Discord developers have emerged, highlighting the evolving threat landscape.…
Read More
This article discusses the evolution of cyber warfare through historical cyberattacks, emphasizing the importance of cybersecurity in the digital age. It highlights ten significant cyber incidents that have shaped our understanding of digital security, the lessons learned, and the ongoing threats organizations face today. Affected: organizations, government, healthcare, energy, transportation, technology sector
Read More
Keypoints :
Cyberattacks are malicious attempts to steal, damage, or disrupt computer systems and data.…
Summary: Ubisoft has released patches for Assassin’s Creed Valhalla and Origins to address compatibility issues with Windows 11 24H2, which had caused crashes and other gameplay problems. Microsoft had previously blocked upgrades for PCs running these games due to user complaints. With the new updates, players can now enjoy these titles without the previous disruptions.…
Read More
Cyble Research and Intelligence Labs (CRIL) has uncovered a cyberattack targeting organizations in Germany, utilizing a deceptive LNK file within an archive to execute a malicious payload known as Sliver. The attack employs DLL sideloading and proxying techniques to maintain stealth and control over the infected systems.…
Read More
Summary: Amazon has issued a security advisory for two critical vulnerabilities (CVE-2025-0500 and CVE-2025-0501) affecting its native clients for Amazon WorkSpaces, AppStream 2.0, and DCV, with a CVSSv4 score of 7.7. These vulnerabilities could enable attackers to execute man-in-the-middle (MITM) attacks, potentially granting unauthorized access to remote sessions.…
Read More
Silverfort has uncovered a significant misconfiguration in Active Directory Group Policy that allows NTLMv1 authentications to persist despite attempts to disable it. This flaw poses a security risk for organizations using on-prem applications, as attackers can exploit this vulnerability to gain unauthorized access. Affected: Active Directory, NTLMv1
Read More
Keypoints :
Silverfort’s research reveals a misconfiguration in Group Policy that allows NTLMv1 authentications to continue.…
A recent cybersecurity alert has revealed that fake CrowdStrike recruiters are distributing malware through phishing emails, tricking victims into downloading a malicious executable that installs a cryptocurrency miner. This scam uses a fake recruitment domain to lure job seekers. Affected: CrowdStrike, job seekers, cryptocurrency mining sector
Read More
Keypoints :
Fake CrowdStrike recruiters are distributing malware via phishing emails.…
Summary: A malicious package named ‘pycord-self’ has been discovered on the Python package index (PyPI), targeting Discord developers to steal authentication tokens and establish a backdoor for remote control. This package masquerades as the legitimate ‘discord.py-self’ library, which has a significant user base. The malicious code enables attackers to hijack accounts and maintain persistent access to victims’ systems.…
Read More
This week’s cybersecurity newsletter highlights critical vulnerabilities in Fortinet and BeyondTrust products, the exploitation of multiple zero-day flaws by Microsoft, and emerging ransomware tactics targeting AWS. Additionally, it discusses a significant data breach at Stiiizy, the impact of healthcare data breaches in the US, and various government responses to cyber threats.…
Read More