A week in security (Nov 22 – Nov 28)

Credit to Author: Malwarebytes Labs| Date: Mon, 29 Nov 2021 12:57:58 +0000

The most important and interesting security stories from the last seven days.

Categories: Malwarebytes news

Tags:

(Read more…)

The post A week in security (Nov 22 – Nov 28) appeared first on Malwarebytes Labs.

Read more

Windows Installer vulnerability becomes actively exploited zero-day

Credit to Author: Pieter Arntz| Date: Wed, 24 Nov 2021 14:21:50 +0000

A variant of an already patched vulnerability was disclosed by a researcher frustrated by Microsoft’s rewards.

Categories: Exploits and vulnerabilities

Tags:

(Read more…)

The post Windows Installer vulnerability becomes actively exploited zero-day appeared first on Malwarebytes Labs.

Read more

A week in security (Nov 15 – Nov 21)

Credit to Author: Malwarebytes Labs| Date: Mon, 22 Nov 2021 12:53:06 +0000

The most important and interesting security stories from the last seven days.

Categories: A week in security

Tags:

(Read more…)

The post A week in security (Nov 15 – Nov 21) appeared first on Malwarebytes Labs.

Read more

A week in security (Nov 1 – Nov 7)

Credit to Author: Malwarebytes Labs| Date: Mon, 08 Nov 2021 11:18:59 +0000

A roundup of the previous week’s blog post, and the most important and interesting security events and happenings.

Categories: A week in security

Tags:

(Read more…)

The post A week in security (Nov 1 – Nov 7) appeared first on Malwarebytes Labs.

Read more

HiveNightmare aka SeriousSAM vulnerability : what to do

Credit to Author: Greg Iddon| Date: Thu, 22 Jul 2021 12:05:12 +0000

Last updated 2021-07-22 HiveNightmare (CVE-2021-36934), also known as SeriousSAM, is a high severity zero-day elevation of privilege vulnerability in Windows currently under investigation by Microsoft. Since Windows 10 build 1809, the Access Control Lists (ACLs) for %windir%System32config have been granting read access to non-admin users. This is the primary directory that contains the files for [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/YBtfaot3ORM” height=”1″ width=”1″ alt=””/>

Read more

PrintNightmare vulnerability: what to do

Credit to Author: Anthony Merry| Date: Thu, 01 Jul 2021 11:22:21 +0000

PrintNightmare is a zero-day critical Windows bug that allows Remote Code Execution. It affects all supported Windows machines, including both endpoints and servers. For more information on the bug, please read the article on Naked Security.  As of 1 July 2021, there is no official patch yet to address this bug. Given the severity, we [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/KdxMKomfAe0″ height=”1″ width=”1″ alt=””/>

Read more

Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emails

Credit to Author: BrianKrebs| Date: Tue, 02 Mar 2021 21:19:17 +0000

Microsoft Corp. today released software updates to plug four critical security holes that attackers have been using to plunder email communications at companies that use its Exchange Server products. The company says all four flaws are being actively exploited as part of a complex attack chain deployed by a previously unidentified Chinese cyber espionage group.

Read more