Tag: windows
-
Jetzt Updates einspielen: Windows-Nutzer werden attackiert
Mindestens eine zum Januar-Patchday geschlossene Windows-Lücke wird schon aktiv ausgenutzt. Nutzer sollten ihre Systeme zügig aktualisieren. First seen on golem.de Jump to article: www.golem.de/news/jetzt-updates-einspielen-windows-nutzer-werden-attackiert-2601-204160.html
-
January 2026 Microsoft Patch Tuesday: Actively exploited zero day needs attention
More priorities: Executives should also prioritize rapid patching and risk reduction efforts this month around the Windows Local Security Authority Subsystem Service Remote Code Execution, Windows Graphics Component Elevation of Privilege, and Windows Virtualization Based Security Enclave Elevation of Privilege flaws, Bicer said, as these vulnerabilities directly enable full system or trust boundary compromise.Strategic focus…
-
Windows info-disclosure 0-day bug gets a fix as CISA sounds alarm
First Patch Tuesday of 2026 goes big First seen on theregister.com Jump to article: www.theregister.com/2026/01/14/patch_tuesday_january_2026/
-
Developer writes script to throw AI out of Windows
Satya Nadella’s call to accept and embrace desktop brainboxes faces skepticism First seen on theregister.com Jump to article: www.theregister.com/2026/01/13/script_removes_ai_from_windows/
-
Microsoft January 2026 Patch Tuesday: 115 Vulnerabilities Fixed
Microsoft kicks off 2026 with 115 security updates, including a fix for an actively exploited zero-day. Protect your Windows and Office systems today. First seen on hackread.com Jump to article: hackread.com/microsoft-january-2026-patch-tuesday-vulnerabilities/
-
U.S. CISA adds a flaw in Microsoft Windows to its Known Exploited Vulnerabilities catalog
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, update, vulnerability, windowsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw impacting Microsoft Windows to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Microsoft Windows vulnerability, tracked as CVE-2026-20805 (CVSS Score of 8.7), to its Known Exploited Vulnerabilities (KEV) catalog. This week, Microsoft Patch Tuesday security updates for January 2026 release…
-
Microsoft Patch Tuesday security updates for January 2026 fixed actively exploited zero-day
Microsoft Patch Tuesday addressed 112 security flaws across Windows, Office, Azure, Edge, and more, including eight critical vulnerabilities, kicking off the new year with a major patch update. Microsoft Patch Tuesday security updates for January 2026 release 112 CVEs affecting Windows, Office, Azure, Edge, SharePoint, SQL Server, SMB, and Windows management services. Including third-party Chromium…
-
Wine 11 brings major architectural work, synchronization changes, 600+ bug fixes
Tags: windowsWine, originally short for “Wine Is Not an Emulator,” is a compatibility layer that allows Windows applications to run natively on POSIX-compliant operating systems, including … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/14/wine-11-released/
-
New Windows updates replace expiring Secure Boot certificates
Microsoft has started rolling out new Secure Boot certificates that will automatically install on eligible Windows 11 24H2 and 25H2 systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-rolls-out-new-secure-boot-certificates-for-windows-devices/
-
New Windows updates replace expiring Secure Boot certificates
Microsoft has started rolling out new Secure Boot certificates that will automatically install on eligible Windows 11 24H2 and 25H2 systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-rolls-out-new-secure-boot-certificates-for-windows-devices/
-
Microsoft releases Windows 10 KB5073724 extended security update
Microsoft has released the KB5073724 extended security update to fix the Patch Tuesday security updates, including 3 zero-days and a fix for expiring Secure Boot certificates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-kb5073724-extended-security-update/
-
Windows 11 KB5074109 & KB5073455 cumulative updates released
Microsoft has released Windows 11 KB5074109 and KB5073455 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/windows-11-kb5074109-and-kb5073455-cumulative-updates-released/
-
PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads
Security researchers have identified a sophisticated multi-stage malware campaign dubbed SHADOW#REACTOR that chains together obfuscated Visual Basic Script (VBS) execution, resilient PowerShell stagers, text-only payload delivery mechanisms, and .NET Reactorprotected in-memory loaders to deploy Remcos RAT while evading detection and analysis reliably. Initial infection begins when users execute a malicious VBS script, typically delivered through…
-
SHADOW#REACTOR Campaign Uses Text-Only Staging to Deploy Remcos RAT
SHADOW#REACTOR is a multi-stage Windows malware campaign that stealthily deploys the Remcos RAT using complex infection techniques First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/shadowreactor-text-staging-remcos/
-
Kostenloses Monitoring-Tool für Windows-Infrastrukturen – Mit WhatsUp Gold auch das Active Directory überwachen
First seen on security-insider.de Jump to article: www.security-insider.de/mit-whatsup-gold-auch-das-active-directory-ueberwachen-a-505f770bdbd294cdcba537ccf273e1b9/
-
New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access.”The infection chain follows a tightly orchestrated execution path: an obfuscated VBS launcher executed via wscript.exe invokes a First seen on…
-
Support-Ende Windows 10 & Co – Diese Produkte hat Microsoft 2025 ausgemustert
First seen on security-insider.de Jump to article: www.security-insider.de/microsoft-support-ende-ausmusterung-2025-windows-10-a-00435335eb106f9183afe292c693fbf8/
-
Windows 11: IT-Admins dürfen Copilot wohl bald per Richtlinie entfernen
Microsoft testet eine neue Richtlinie, mit der IT-Admins Copilot von verwalteten Geräten entfernen können. Doch es gibt Einschränkungen. First seen on golem.de Jump to article: www.golem.de/news/windows-11-insider-preview-admins-koennen-copilot-app-per-richtlinie-entfernen-2601-204058.html
-
Windows 11 Insider Preview: Admins können Copilot-App per Richtlinie entfernen
Microsoft testet eine neue Richtlinie, mit der IT-Admins Copilot von verwalteten Geräten entfernen können. Doch es gibt Einschränkungen. First seen on golem.de Jump to article: www.golem.de/news/windows-11-insider-preview-admins-koennen-copilot-app-per-richtlinie-entfernen-2601-204058.html
-
Trotz Kritik und möglicher Sicherheitsrisiken – Microsoft treibt agentenbasiertes Windows 11 weiter voran
First seen on security-insider.de Jump to article: www.security-insider.de/windows-11-ki-entfernen-skript-a-bb4cc6faef3011bbdadc0d99c8dced77/
-
EDRStartupHinder: Blocks Antivirus EDR at Windows 11 25H2 Startup (Defender Included)
A cybersecurity researcher has unveiled EDRStartupHinder, a proof-of-concept tool that prevents antivirus and endpoint detection and response (EDR) solutions from launching during Windows startup, including Microsoft Defender on Windows 11 25H2. The technique exploits Windows Bindlink API functionality through the bindflt.sys driver to interfere with security software initialization. The tool builds on previous research into Bindlink…
-
Microsoft Windows Media Player stops serving up CD album info
No naming that tune and no album covers First seen on theregister.com Jump to article: www.theregister.com/2026/01/09/microsoft_windows_media_player_forgets/
-
xRAT Malware Targets Windows Users via Fake Adult Game
AhnLab Security Intelligence Center (ASEC) has uncovered a dangerous distribution campaign targeting Windows users through Korean web hard services. Threat actors are leveraging xRAT (QuasarRAT) malware, disguising it as legitimate adult game content to deceive unsuspecting users into downloading and executing malicious files. Korean webhard services have become a prime vector for malware distribution, with…
-
Trend Micro Apex Central Flaw Enable Remote Code Execution Attacks
Trend Micro has issued a critical security update for Apex Central to address multiple remotely exploitable vulnerabilities, including a bug that allows unauthenticated attackers to execute code with SYSTEM-level privileges. Organizations running vulnerable builds are urged to patchimmediatelyto avoid both remote code execution anddenial-of-servicerisks.”‹ Critical flaws in Apex Central The update targets Apex Central for Windows and…
-
CrowdStrike to acquire SGNL for $740M, expanding real-time identity security
Market consolidation accelerates: The $740 million price reflects broader consolidation as cybersecurity vendors race to expand identity capabilities. The deal marks the latest in a wave of identity security acquisitions as platform vendors expand beyond core products. Liu compared the move to Palo Alto Networks’ acquisition of CyberArk in 2025, noting both vendors are racing…
-
CrowdStrike to acquire SGNL for $740M, expanding real-time identity security
Market consolidation accelerates: The $740 million price reflects broader consolidation as cybersecurity vendors race to expand identity capabilities. The deal marks the latest in a wave of identity security acquisitions as platform vendors expand beyond core products. Liu compared the move to Palo Alto Networks’ acquisition of CyberArk in 2025, noting both vendors are racing…
-
CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday said it’s retiring 10 emergency directives (Eds) that were issued between 2019 and 2024.The list of the directives now considered closed is as follows -ED 19-01: Mitigate DNS Infrastructure TamperingED 20-02: Mitigate Windows Vulnerabilities from January 2020 Patch TuesdayED 20-03: Mitigate Windows DNS Server First…

