New Windows Flaw Triggering BSOD On Fully Updated Windows 10 & 11 PCs

Currently, there is no workaround or mitigation to fix the CVE-2024-6768 vulnerability. source: www.techworm.net

August 13, 2024 · 1 min · 14 words · Martha Green

Microsoft Warns Office Zero-day Vulnerability Can Lead To Data Leak

However, an attacker would have no way to force the user to visit the website. source: www.techworm.net

August 10, 2024 · 1 min · 17 words · Kimberly Powers

Netflix, Crunchyroll Data Leak: Full Anime Episodes Leaked Online

The leaked content first started appearing online on August 6th. One of our post-production partners has been compromised and footage from several of our titles has unfortunately leaked online. Our team is aggressively taking action to have it taken down, the Netflix spokesperson stated. We are aware of a content leak ahead of one of our fall series. Protecting our clients confidentiality and ensuring the security of their content is our highest priority....

August 10, 2024 · 1 min · 110 words · Stacey Perez

Hackers Exploit 18-year-old Security Flaw In Firefox, Chrome & Safari

Researchers at Israel-based cybersecurity firm Oligo have discovered a critical 18-year-old vulnerability that affects all major web browsers, including Googles Chromium, Mozilla Firefox, and Apples Safari, allowing attackers to breach local networks. Dubbed 0.0.0.0 Day, this vulnerability bypasses web app security in all major browsers and interacts with services running on an organizations local web connection. This interaction can potentially grant threat actors unauthorized access to sensitive information and, in some instances, even allow them to execute remote codeon local services....

August 9, 2024 · 3 min · 522 words · Samuel Leonard

Nearly 3 Billion Personal Data Exposed In One Of The Biggest Breach Ever

The threat group also said it would provide buyers with credentials to enter the NPDs server. It is unclear when or how the data breach occurred. source: www.techworm.net

August 9, 2024 · 1 min · 28 words · Jason Miller

Undetectable Windows Update Downgrade Attack Exposes Fully-Updated Systems

Six months after the reporting, Leview revealed the Windows Downdate downgrade attack to the public. It also said that it is not aware of any attempts to exploit these vulnerabilities in the wild. We appreciate the work of SafeBreach in identifying and responsibly reporting this vulnerability through a coordinated vulnerability disclosure. source: www.techworm.net

August 8, 2024 · 1 min · 53 words · Brandon Parker

Hackers Exploiting Flaws In Windows Smart App Control Since 6 Years

It protects against phishing or malware websites and applications and the downloading of potentially malicious files. It runs on files that have theMark of the Web(MotW) and are clicked on by users. It is worth noting that when SAC is enabled, it replaces and disables Defender SmartScreen. Alternatively, one can create an LNK file that contains a relative path such as .\target.exe. Reputation Hijacking: Involves finding and repurposing apps with a good reputation to bypass the security system....

August 7, 2024 · 1 min · 107 words · Destiny Mitchell

Google Fixes Zero-Day Kernel Vulnerability In Android Devices

Table Of Contents Whats the vulnerability? The threat actors could potentially use it to execute arbitrary code without user interaction on unpatched devices. Additionally, a high-severity vulnerability (CVE-2024-34727) in the System component has also been addressed. source: www.techworm.net

August 6, 2024 · 1 min · 38 words · Paul Harper

Nano11 Download ISO: Superlite Windows 11 Version

Windows 11is a leap forward for Microsoft but it is not ideal for older computers. You also get updated Paint, Notepad, and other programs to use as a daily driver. Nano11 ISO download size is under 1.5 GB and it takes less time to install. Table Of Contents Download Nano11 ISO B. Once that is done, it’s possible for you to install it on the computer. You will require the following for this process....

August 6, 2024 · 2 min · 322 words · Sarah Moss

Chinese Hackers Compromises ISP To Poison DNS Responses

To do that, the attackers interrupted and modified victims DNS requests and redirected them to malicious IP addresses. Once the ISP rebooted, it took specific web connection components offline, which immediately stopped the DNS poisoning. source: www.techworm.net

August 4, 2024 · 1 min · 37 words · Jennifer Cooper

Chipmaker Intel To Lay Off Over 15,000 Employees

This is painful news for me to share. I know it will be even more difficult for you to read. There are a lot of reasons for this, but its not a sustainable path forward, he said. The company attributes the loss to gross margin headwinds from the accelerated ramp of its AI PC products. source: www.techworm.net

August 2, 2024 · 1 min · 57 words · Justin Willis

Ransomware Attack Disrupts Services Of 300 Small Indian Banks

The attack affected online transactions, including cash withdrawals at ATMs as well as UPI payments. All online transactions, such as RTGS and UPI payments, are affected. They also assured that other banking services are functioning normally. source: www.techworm.net

August 1, 2024 · 1 min · 38 words · Mandy Keller

Android SMS Stealer Campaign Detected In 113 Countries

This enables the attacker to create a new APK for personalized tracking or future attacks. Of those 107,000 malware samples, over 99,000 of these applications are/were unknown and unavailable in generally available repositories. Fast SMS (fastsms[. The proliferation of this mobile malware, coupled with the ease of data theft (eg. SMS, OTPs), poses a significant threat to individuals and organizations alike. source: www.techworm.net

July 31, 2024 · 1 min · 63 words · Matthew Greene