Windows 10 Ransomware Protection Easily Bypassed

Windows 10 Ransomware Protection Easily Bypassed

It’s rather trivial to bypass the anti-ransomware feature that Microsoft introduced in its Windows 10 Fall Creators Update, a security researcher claims. Dubbed Controlled folder access, the anti-ransomware feature was announced as part of Windows Defender Exploit Guard, a new set of host intrusion prevention capabilities in Microsoft’s latest platform iteration. When announcing the feature, […]

Ubuntu Preps Patches for Meltdown, Spectre CPU Flaws

Ubuntu security updates planned for January 9 will patch the recently disclosed Meltdown and Spectre CPU vulnerabilties, Canonical has announced. Impacting billions of devices around the world, Meltdown and Spectre are two new side-channel attacks targeting CPUs from Intel, AMD and ARM. Residing in the CPU architecture, the flaws impact Windows, MacOS, Linux, and many […]

Intel Patches CPUs Against Meltdown, Spectre Exploits

Intel has been working with its partners to release software and firmware updates that should protect systems against the recently disclosed CPU attacks. The company expects patches to become available for a majority of its newer products by the end of next week. Researchers this week disclosed the details of Spectre and Meltdown, two new […]

Botnet Huawei Router Exploit Code Now Public

Exploit code used by the Satori botnet to compromise Huawei routers via a zero-day vulnerability became public last week, researchers have discovered. The exploit has been used in attacks involving the Mirai variant Satori to target Huawei vulnerability CVE-2017–17215, which was unpatched at the time the first assaults started. The vulnerability was found in Huawei […]

Unpatched macOS Flaw Allows Code Execution, Root Access

A researcher who specializes in hacking Apple’s iOS operating system has made public the details of an unpatched vulnerability in macOS that can be exploited to take complete control of a system. The details of the exploit and proof-of-concept (PoC) code were made public on the first day of 2018 – or the last day […]

Uber Hacked In Covered-Up Breach

Uber said Tuesday that hackers accessed the personal data of 57 million of its users in a breach that had been covered up by the company for more than a year. Stolen information included the names, email addresses and mobile phone numbers of customers around the world, while the names and driver’s license numbers of […]

Symantec Patches Vulnerability in Management Console

Symantec has released an update to address a directory traversal vulnerability in the Symantec Management Console. Tracked as CVE-2017-15527, the security flaw has a CVSS score of 7.6 and has been assessed with a High severity rating, Symantec explains in an advisory published on Monday. The issue has been addressed in Symantec Management Console version […]

Microsoft Issues Advisory for Mitigating DDE Attacks

A security advisory published by Microsoft on Wednesday provides information on how users can protect themselves against recent attacks abusing the Dynamic Data Exchange (DDE) protocol. DDE is designed for data exchanges between Office and other Windows applications. Researchers warned recently that the way DDE fields are processed could be abused by hackers to create […]

Researcher Bypasses Intrusion Detection Systems Using IDS Signatures

Bucharest – DefCamp 2017- Intrusion detection system (IDS) signatures can be used as an evasion technique to bypass the IDS itself, a security researcher claims. During a presentation at the DefCamp 2017 security conference in Bucharest, Romania, Kirill Shipulin, a security researcher atPositive Technologies, explained that available IDS signatures can be turned against the system […]

Oracle Patches Critical Flaw in Identity Manager

Oracle informed customers on Friday that its Identity Manager product is affected by a critical vulnerability that can be easily exploited by malicious actors. Part of the company’s Oracle Fusion Middleware offering, Identity Manager is an enterprise identity management system that automatically manages user access privileges across all of the organization’s resources. Oracle Identity Manager […]