Search results
Phishing emails abuse Windows search protocol to push malicious scripts
BleepingComputer· 6 days agoA new phishing campaign uses HTML attachments that abuse the Windows search protocol (search-ms URI)...
Hackers use emoji to dispatch malware — and even governments are being attacked, so be on your guard
TechRadar· 1 day agoPotentially dangerous malware that allows threat actors to communicate with command and control (C2)...
ASUS warns of critical remote authentication bypass on 7 routers
BleepingComputer· 4 days agoASUS has released a new firmware update that addresses a vulnerability impacting seven router models that allow remote attackers to log in to devices.
Exploit for Veeam Recovery Orchestrator auth bypass available, patch now
BleepingComputer· 5 days agoA proof-of-concept (PoC) exploit for a critical Veeam Recovery Orchestrator authentication bypass...
KB5039213: Microsoft finally fixes Windows 11 "65000" BitLocker bug
Neowin· 7 days agoMicrosoft has finally managed to resolve a bug related to BitLocker encryption reporting. The issue was first confirmed in October last year, and it has finally been fixed on Windows 11 21H2.
TellYouThePass Ransomware Group Exploits Critical PHP Flaw
Dark Reading· 6 days agoA threat group is exploiting a critical, easily exploitable PHP bug for remote code execution (RCE)...
Gateway - Quartz
Quartz· 6 hours agoTesla shareholders are set to finally reveal whether or not CEO Elon Musk’s $46 billion pay package will be reapproved on Thursday, several months after it was struck down by a Delaware judge ...
Black Basta might have exploited Microsoft flaw as zero-day | TechTarget
SearchSecurity.com· 6 days agoThe Black Basta ransomware group might have exploited a previously disclosed and patched Microsoft Windows elevation of privilege vulnerability as a zero-day, according to new research by Symantec ...
What is an infinite mint attack, and how does it work?
The Cointelegraph· 4 hours agoAn infinite mint attack occurs when an attacker manipulates a contract’s code to continuously mint new tokens beyond the authorized supply limit. The attack compromises the integrity and value ...
Congress grills Microsoft president over security failures | TechTarget
SearchSecurity.com· 4 days agoMicrosoft President Brad Smith addressed Microsoft's recent security shortfalls during a House Committee on Homeland Security hearing Thursday. The hearing ...