Tag: windows
-
Microsoft flips Windows Autopatch to default hotpatch security updates
Microsoft is changing the default behavior in Windows Autopatch so that hotpatch security updates are enabled automatically for eligible devices managed through Microsoft … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/microsoft-windows-autopatch-default-security-updates/
-
Microsoft to enable Windows hotpatch security updates by default
Microsoft will turn on hotpatch security updates by default for all eligible Windows devices managed through Microsoft Intune and the Microsoft Graph API, beginning with the May 2026 Windows security update. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-to-enable-hotpatch-security-updates-by-default-in-may/
-
Bug bounties are broken, and the best security pros are moving on
Penetration testing engagements are organized as scheduled contracts with defined scope, set testing windows, and direct communication channels with client teams. Cobalt’s … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/cobalt-ptaas-gains-pentester-support/
-
Fake Claude Code install pages hit Windows and Mac users with infostealers
Researchers uncovered fake Claude Code install pages spreading infostealers that steal passwords and browser sessions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/fake-claude-code-install-pages-hit-windows-and-mac-users-with-infostealers/
-
Chinese Cyber Threat Lurks In Critical Asian Sectors for Years
An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows and Linux, likely for spying. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/chinese-cyber-threat-critical-asian-sectors
-
Microsoft still working to fix Windows Explorer white flashes
Microsoft has confirmed that it’s still working to fully address a known issue that causes bright white flashes when opening the File Explorer on some Windows 11 systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-still-working-to-fix-windows-explorer-white-flashes/
-
BoryptGrab Malware Abuses GitHub to Steal Browser and Crypto Wallet Data
A new Windows stealer dubbed BoryptGrab is being distributed through a large, ongoing campaign abusing fake GitHub repositories that pose as free tools, game cheats, and popular utilities. The malware focuses on stealing browser data, cryptocurrency wallet information, and system details, while also grabbing screenshots, common files, Telegram data, Discord tokens, and stored passwords. Attackers created more…
-
Für 220.000 US-Dollar: Exploit für gefährliche Windows-Lücke steht zum Verkauf
Ein Hacker versucht, aus einer Sicherheitslücke in Windows Profit zu schlagen. Er verlangt 220.000 US-Dollar für einen Exploit, der Systemrechte verleiht. First seen on golem.de Jump to article: www.golem.de/news/fuer-220-000-us-dollar-exploit-fuer-gefaehrliche-windows-luecke-steht-zum-verkauf-2603-206241.html
-
Termite ransomware breaches linked to ClickFix CastleRAT attacks
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/
-
One click on this fake Google Meet update can give attackers control of your PC
We found a fake Google Meet update that enrolls the victim’s Windows PC in an attacker’s device management system. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/one-click-on-this-fake-google-meet-update-can-give-attackers-control-of-your-pc/
-
ClickFix attackers using new tactic to evade detection, says Microsoft
AppData\Local that is then invoked through cmd.exe to write a VBScript to %Temp%. The batch script is executed via cmd.exe with the /launched command-line argument, and is then executed again through MSBuild.exe, resulting in LOLBin abuse. The script connects to Crypto Blockchain RPC endpoints, indicating etherhiding technique, and also performs QueueUserAPC()-based code injection into chrome.exe…
-
Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins
Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless sign-ins to device authentication. The post Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-bitwarden-passkey-windows-11-sign-in/
-
Microsoft spots ClickFix campaign getting users to self-pwn on Windows Terminal
Crooks tweak familiar copy-paste ruse so that victims run malicious commands themselves First seen on theregister.com Jump to article: www.theregister.com/2026/03/06/microsoft_spots_clickfix_campaign_abusing/
-
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October
Released from the curse of the update bork fairy First seen on theregister.com Jump to article: www.theregister.com/2026/03/06/microsoft_finally_gets_around_to/
-
New Linux Rootkits Leverage Advanced eBPF and io_uring Techniques for Stealthy Attacks
Linux rootkits have historically received less attention than their Windows counterparts, but the rapid adoption of Linux in cloud infrastructure, containers, and IoT devices has shifted the threat landscape. Attackers are constantly innovating, and over the past two decades, Linux rootkits have evolved significantly. While early threats relied on easily detectable userland shared object injections…
-
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants.The activity is being tracked by Cisco Talos under the moniker UAT-9244, describing it as closely associated with another cluster known as FamousSparrow.It’s worth First seen…
-
Chinese state hackers target telcos with new malware toolkit
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-state-hackers-target-telcos-with-new-malware-toolkit/
-
Where Multi-Factor Authentication Stops and Credential Abuse Starts
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage. Enforced through an identity provider (IdP) such as Microsoft Entra ID, Okta,…
-
Nach Monaten gefixt: Microsoft gesteht Recovery-Panne unter Windows 10
Die Wiederherstellungsumgebung von Windows 10 ist auf einigen Systemen seit Oktober 2025 unbrauchbar. Eine Lösung gibt es erst jetzt. First seen on golem.de Jump to article: www.golem.de/news/nach-monaten-gefixt-microsoft-gesteht-recovery-panne-unter-windows-10-2603-206117.html
-
14 old software bugs that took way too long to squash
Tags: access, api, attack, authentication, automation, bug-bounty, communications, computer, control, credentials, cve, cvss, cyber, data, data-breach, dns, dos, encryption, exploit, flaw, hacker, Hardware, infosec, infrastructure, Internet, kaspersky, linux, malicious, malware, microsoft, mitigation, network, nist, open-source, password, programming, remote-code-execution, risk, service, software, stuxnet, supply-chain, technology, theft, threat, tool, update, usa, vulnerability, windows, zero-dayAge: 30 yearsDate introduced: 1995Date fixed: February 2026Researchers unearthed a legacy flaw in the widely used libpng open-source library that had existed since the technology was first released more than 30 years ago.The heap buffer overflow vulnerability (CVE-2026-25646) meant that applications using the flawed software would crash when presented with a maliciously constructed PNG raster…
-
14 old software bugs that took way too long to squash
Tags: access, api, attack, authentication, automation, bug-bounty, communications, computer, control, credentials, cve, cvss, cyber, data, data-breach, dns, dos, encryption, exploit, flaw, hacker, Hardware, infosec, infrastructure, Internet, kaspersky, linux, malicious, malware, microsoft, mitigation, network, nist, open-source, password, programming, remote-code-execution, risk, service, software, stuxnet, supply-chain, technology, theft, threat, tool, update, usa, vulnerability, windows, zero-dayAge: 30 yearsDate introduced: 1995Date fixed: February 2026Researchers unearthed a legacy flaw in the widely used libpng open-source library that had existed since the technology was first released more than 30 years ago.The heap buffer overflow vulnerability (CVE-2026-25646) meant that applications using the flawed software would crash when presented with a maliciously constructed PNG raster…
-
Bitwarden adds support for passkey login on Windows 11
Bitwarden announced support for logging into Windows 11 devices using passkeys stored in the manager’s vault, enabling phishing-resistant authentication. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/bitwarden-adds-support-for-passkey-login-on-windows-11/
-
Bitwarden adds support for passkey login on Windows 11
Bitwarden announced support for logging into Windows 11 devices using passkeys stored in the manager’s vault, enabling phishing-resistant authentication. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/bitwarden-adds-support-for-passkey-login-on-windows-11/
-
Windows 10 KB5075039 update fixes broken Recovery Environment
Microsoft has released the KB5075039 Windows Recovery Environment update for Windows 10 to fix a long-standing issue that prevented some users from accessing the Recovery environment. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/windows-10-kb5075039-update-fixes-broken-recovery-environment/

