Tag: windows
-
Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions
Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution.The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of…
-
GenDigital Research Exposes AuraStealer Infostealer Tactics
GenDigital researchers reveal how AuraStealer uses advanced evasion and a MaaS model to steal data from Windows systems. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/gendigital-research-exposes-aurastealer-infostealer-tactics/
-
New DocuSign-Themed Phishing Scam Delivers Stealth Malware to Windows Devices
New research has uncovered asophisticated phishingcampaign that abusesDocuSign’sbrand to deliver Vidar malware and infect Windows systems. The operation uses a realistic phishing site, a fake signed installer, access-code checks, andtimebasedexecution barriers to evade both users and automated analysis. DocuSign-themed phishing setup The attack starts with a targeted phishing email that pretends to come fromDocuSignand urges…
-
How Attackers Hide Processes by Abusing Kernel Patch Protection
Security researchers have identified a sophisticated technique that allows attackers to hide malicious processes from Windows Task Manager and system monitoring tools, even on systems with Microsoft’s most advanced kernel protections enabled. The bypass leverages legitimate Windows APIs to manipulate core data structures before integrity checks can detect tampering, circumventing both PatchGuard and Hypervisor-Protected Code…
-
WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking trojan called Astaroth in attacks targeting Brazil.The campaign has been codenamed Boto Cor-de-Rosa by Acronis Threat Research Unit.”The malware retrieves the victim’s WhatsApp contact list and automatically sends malicious messages to each contact to further…
-
A Single Browser Flaw, Millions at Risk: What the Chrome WebView Vulnerability Teaches Us About Exposure Windows
Tags: android, application-security, browser, chrome, cybersecurity, flaw, google, malicious, risk, update, vulnerability, windowsA recent security update reveals that Google patched a high-severity Chrome WebView vulnerability that could allow attackers to bypass application security restrictions and execute malicious content within Android and enterprise applications, according to Cybersecurity News. Because Chrome WebView is embedded inside countless applications, the flaw expanded risk far beyond traditional browser usage. Many organizations were…
-
Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns with Multiple Malware
A custom Windows packer dubbed pkr_mtsi is fueling large-scale malvertising and SEO”‘poisoning campaigns that deliver a broad range of information”‘stealing and remote”‘access malware, according to new research. First observed in the wild on April 24, 2025, the packer remains active and has continuously evolved over the past eight months, while retaining a stable behavioral core that makes it…
-
Malicious NPM Packages Deliver NodeCordRAT
IntroductionZscaler ThreatLabz regularly monitors the npm database for suspicious packages. In November 2025, ThreatLabz identified three malicious packages: bitcoin-main-lib, bitcoin-lib-js, and bip40. The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload. This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with data-stealing capabilities. It is also possible to download bip40…
-
Malicious NPM Packages Deliver NodeCordRAT
IntroductionZscaler ThreatLabz regularly monitors the npm database for suspicious packages. In November 2025, ThreatLabz identified three malicious packages: bitcoin-main-lib, bitcoin-lib-js, and bip40. The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload. This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with data-stealing capabilities. It is also possible to download bip40…
-
Versatile Malware Loader pkr_mtsi Delivers Diverse Payloads
Malicious Windows packer named pkr_mtsi used as a flexible malware loader in malvertising campaigns First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/malware-loader-pkrmtsi-payloads/
-
Gratis-Versprechen, teurer Fehler: Hacker kapert über Windows-Aktivierungstool tausende Krypto-Transfers
First seen on t3n.de Jump to article: t3n.de/news/windows-aktivierungstool-infiziert-pc-1724021/
-
Copilot, Recall, and Other AI Tools Can Be Removed from Windows 11 with New Tool
A new community tool is giving Windows 11 users far more control over Microsoft’s growing stack of AI features. An open”‘source project called RemoveWindowsAI now lets administrators and power users disable or strip out components such as Copilot, Recall, and other AI integrations that are tightly integrated with the operating system and Microsoft apps. The tool targets…
-
Fake Windows BSODs check in at Europe’s hotels to con staff into running malware
Phishers posing as Booking.com use panic-inducing blue screens to bypass security controls First seen on theregister.com Jump to article: www.theregister.com/2026/01/06/russia_hackers_hotel_bsods/
-
How to Set Up Azure Trusted Signing to Sign an EXE?
Introduction Code signing is no longer an optional process Windows, antivirus engines, and enterprise security tools all expect executables to be digitally signed. Previously, developers purchased an EV Code Signing Certificate, stored it on a USB token or HSM, and had to maintain it for years. Azure Trusted Signing reimagines the process with cloud-based”¦ Read…
-
Malware im Anmarsch: Hacker tricksen Windows-Nutzer mit Fake-Bluescreens aus
Ein Bluescreen, der gleich die Problemlösung mitliefert? Zu schön, um wahr zu sein. Es droht eine gefährliche Malware-Infektion. First seen on golem.de Jump to article: www.golem.de/news/malware-im-anmarsch-hacker-tricksen-windows-nutzer-mit-fake-bluescreens-aus-2601-203847.html
-
Product showcase: Blokada for Android gives users control over network traffic
Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/06/product-showcase-blokada-android-control-network-traffic/
-
Windows Users at Risk as Critical Zoom Vulnerability Exploited
A critical Zoom vulnerability put Windows users at risk of data theft and system compromise. Zoom has patched the flaw. Users should update immediately. The post Windows Users at Risk as Critical Zoom Vulnerability Exploited appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-zoom-flaw-windows-users-at-risk/
-
Windows 11 ohne Cloud-Zwang – Mehr Datenschutz: Windows 11 ohne Microsoft-Konto nutzen
First seen on security-insider.de Jump to article: www.security-insider.de/mehr-datenschutz-windows-11-ohne-microsoft-konto-nutzen-a-83bbe731e453a9198535dd4b6be6025f/
-
Windows und Office: Aktivierungstool infiziert 2,8 Millionen Systeme mit Malware
Ein 29-Jähriger soll unzählige PCs mit Malware verseucht haben. Opfer wurden mit einer kostenlosen Aktivierung für Windows und Office gelockt. First seen on golem.de Jump to article: www.golem.de/news/windows-und-office-aktivierungstool-infiziert-2-8-millionen-systeme-mit-malware-2601-203792.html
-
APT36 Uses Malicious Windows Shortcuts to Target Indian Government
APT36 is targeting Indian government entities using malicious Windows shortcut files disguised as PDFs. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/apt36-uses-malicious-windows-shortcuts-to-target-indian-government/
-
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that grants them persistent control over compromised hosts.”The campaign employs deceptive delivery techniques, including a weaponized Windows shortcut (LNK) file masquerading as a legitimate PDF document…
-
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that grants them persistent control over compromised hosts.”The campaign employs deceptive delivery techniques, including a weaponized Windows shortcut (LNK) file masquerading as a legitimate PDF document…
-
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that grants them persistent control over compromised hosts.”The campaign employs deceptive delivery techniques, including a weaponized Windows shortcut (LNK) file masquerading as a legitimate PDF document…
-
Support-Ende Windows 10, Azure & Co – Diese Produkte mustert Microsoft 2026 aus
First seen on security-insider.de Jump to article: www.security-insider.de/microsoft-support-ende-ausmusterung-2026-windows-office-azure-a-8ea68ba18b8ce897d7e6866f03c0021d/
-
APT36 Targets Indian Government Systems Using Malicious Windows LNK Files
A sophisticated cyber-espionage operation attributed to APT36, also known as Transparent Tribe, has been identified targeting Indian governmental, academic, and strategic entities through weaponized Windows shortcut files designed to evade detection and establish persistent remote access. The Pakistan-aligned threat actor deployed a deceptive LNK-based infection chain that leverages trusted system binaries and fileless execution techniques…
-
New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender
Cybersecurity researchers have spotted a new high-sophistication malware loader being advertised on dark web forums, marketed as a commercial solution for evading modern endpoint protection. The tool, dubbed InternalWhisper x ImpactSolutions, is being promoted by a threat actor known as >>ImpactSolutions.
-
Aufrüsten oder neu kaufen? 10-Support-Ende: Viele Nutzer vor Geräte-Neukauf
Tags: windowsFirst seen on security-insider.de Jump to article: www.security-insider.de/windows-10-support-ende-viele-nutzer-vor-geraete-neukauf-a-9e870edd7f707dd86da0b5bdfdb097c2/
-
Aufrüsten oder neu kaufen? 10-Support-Ende: Viele Nutzer vor Geräte-Neukauf
Tags: windowsFirst seen on security-insider.de Jump to article: www.security-insider.de/windows-10-support-ende-viele-nutzer-vor-geraete-neukauf-a-9e870edd7f707dd86da0b5bdfdb097c2/

