Articles tagged "Windows"

Found 25 articles

In February 2026, Microsoft addressed over 50 security vulnerabilities during its Patch Tuesday update, including six zero-day flaws that were actively exploited by attackers. Notably, three of these zero-days involve security feature bypasses. One of the vulnerabilities, identified as CVE-2026-21513, impacts the MSHTML/Trident browser engine used in Internet Explorer on Windows, while CVE-2026-21514 affects Microsoft Word. Attackers can exploit these vulnerabilities by tricking users into opening malicious files or links. As these security holes are actively being exploited, users and organizations must apply the updates promptly to protect their systems from potential breaches.

Impact: Microsoft Windows (Internet Explorer), Microsoft Word
Remediation: Users are advised to install the latest security updates from Microsoft to mitigate these vulnerabilities. Specific patches addressing these issues were released as part of the February 2026 Patch Tuesday.
Read Original

A North Korea-associated hacking group known as UNC1069 is targeting cryptocurrency organizations to steal sensitive information from both Windows and macOS systems. Their approach involves social engineering tactics, including the use of a compromised Telegram account to set up a fake Zoom meeting. This deception leads victims to download malware through a method called ClickFix, which researchers believe may also utilize AI-generated content to enhance its effectiveness. The implications of these attacks are significant, as they not only threaten the financial security of targeted companies but also highlight the evolving tactics used by cybercriminals in the cryptocurrency sector. Protecting against such sophisticated schemes is increasingly critical for organizations in this space.

Impact: Windows and macOS systems, cryptocurrency organizations
Remediation: Organizations should implement strong security protocols, educate employees about social engineering tactics, and monitor communications for suspicious activity.
Read Original
UK Construction Firm Hit by Prometei Botnet Hiding in Windows Server

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A UK construction firm has fallen victim to an attack by the Russian Prometei botnet, as detailed by cybersecurity firm eSentire. The attack involved the use of TOR for anonymity, and attackers focused on stealing passwords and employing decoy tactics to mislead security measures. This incident raises concerns about the security of critical infrastructure in the construction sector, which may not be as fortified against cyber threats as other industries. The implications are significant, as compromised systems can lead to operational disruptions and financial losses for businesses. Companies in similar sectors should take note and assess their own cybersecurity defenses to prevent similar attacks.

Impact: UK construction firm's Windows Server systems
Remediation: Implement strong password policies, enhance network monitoring, and consider using intrusion detection systems.
Read Original

Avast has rolled out two new security features aimed at detecting scams involving deepfake technology. The Avast Scam Guardian and Scam Guardian Pro are now available for mobile devices, while the Avast Deepfake Guard is launched for Windows PCs. This AI-driven tool is designed to analyze and identify harmful audio that could be embedded within video content. The goal is to enhance protection for users against various scam tactics that can occur through text messages, phone calls, and video platforms. These updates are particularly relevant as the rise of deepfakes poses a growing risk to online security, making it essential for users to have reliable tools to safeguard against such threats.

Impact: Avast Scam Guardian, Scam Guardian Pro, Avast Deepfake Guard, Windows PCs, mobile devices
Remediation: Users should install Avast Scam Guardian, Scam Guardian Pro, and Avast Deepfake Guard to enhance their protection against scams.
Read Original
Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A new form of malware, known as Pulsar RAT, is being used by hackers to conduct live chat sessions with victims while simultaneously stealing sensitive data. This malware operates on Windows systems, allowing attackers to engage with users in real-time, making it more personal and deceptive. The presence of live chat functionality means that victims may not realize they are being compromised until it's too late. Researchers are warning that this method poses a significant risk to both individuals and organizations, as it can lead to the unauthorized access of personal and financial information. Users are urged to remain vigilant and ensure their systems are secure against such threats.

Impact: Windows systems
Remediation: Users should ensure their antivirus software is up to date and consider employing additional security measures such as firewalls and intrusion detection systems.
Read Original

Microsoft is looking into issues with some Windows 11 devices that are failing to boot after users installed the January 2026 Patch Tuesday security updates. Affected users are encountering 'UNMOUNTABLE_BOOT_VOLUME' errors, which prevent their systems from starting up properly. This situation could disrupt the workflow of many individuals and organizations that rely on Windows 11 for daily operations. Microsoft has not yet provided a specific fix or workaround for the problem, leaving users uncertain about how to resolve the issue. The investigation is ongoing as the company seeks to identify the root cause of the boot failures and implement a solution.

Impact: Windows 11 devices
Remediation: N/A
Read Original
FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys

Hackread – Cybersecurity News, Data Breaches, AI, and More

In a recent incident, the FBI accessed the BitLocker recovery keys of Windows laptops after Microsoft shared these keys as part of a legal request. This situation raises significant concerns about user privacy and data security, as it reveals how easily law enforcement can obtain sensitive information stored on personal devices. Affected users include anyone using Windows laptops that utilize BitLocker encryption for data protection. The implications are serious; users may feel their encrypted data is not as secure as previously thought, prompting a reevaluation of reliance on built-in security features. This incident serves as a reminder that while encryption is a valuable tool, it does not guarantee absolute privacy when legal authorities are involved.

Impact: Windows PCs utilizing BitLocker encryption
Remediation: Users should consider additional layers of security, such as using personal encryption solutions or regularly updating privacy settings.
Read Original

Microsoft has issued a temporary workaround for users experiencing freezes in Outlook after applying the latest Windows security updates. This issue has affected many customers who rely on Outlook for their email and daily tasks, causing disruptions and frustration. The freezes appear to be linked to the recent updates, prompting Microsoft to step in with a solution while they work on a permanent fix. Users are advised to implement the provided workaround to mitigate the impact on their productivity. This situation serves as a reminder of how software updates, while important for security, can sometimes lead to unexpected problems.

Impact: Outlook, Windows
Remediation: Temporary workaround provided by Microsoft
Read Original

Microsoft has rolled out emergency updates for Windows 10, Windows 11, and Windows Server to address issues that arose from the January Patch Tuesday updates. These out-of-band updates specifically target problems related to system shutdowns and Cloud PC functionality. Users of these operating systems may experience disruptions due to these bugs, which could impact productivity and system reliability. It's crucial for users to apply these updates promptly to ensure their systems operate smoothly and to mitigate any potential security risks that may arise from unresolved bugs.

Impact: Windows 10, Windows 11, Windows Server
Remediation: Users should apply the emergency updates provided by Microsoft to resolve the shutdown and Cloud PC issues.
Read Original

The January Patch Tuesday updates for Windows include important changes to Secure Boot, which safeguards computers against bootkit malware. Secure Boot is a security feature that ensures only trusted software is loaded during the startup process. The updates address expiring certificates that could compromise this protection if not renewed. Users and IT administrators are urged to install these patches promptly to mitigate the risk of bootkit attacks, which can allow malicious software to take control of a system before the operating system loads. Keeping Secure Boot updated is crucial for maintaining the integrity and security of Windows PCs.

Impact: Windows PCs with Secure Boot enabled
Remediation: Install the January Patch Tuesday updates for Windows to refresh Secure Boot certificates.
Read Original
Actively Exploited

Attackers are employing a combination of social engineering tactics, including fake CAPTCHAs and counterfeit Blue Screen of Death (BSOD) messages, to trick users into executing harmful code. This method, known as ClickFix, prompts victims to copy and paste malicious scripts, potentially compromising their systems. The attacks primarily target unsuspecting Windows users who may panic upon seeing the fake BSOD, believing their computer has crashed. It's crucial for users to be aware of these tactics and to verify the legitimacy of any error messages before taking action. This incident serves as a reminder of the importance of maintaining vigilance against deceptive online threats.

Impact: Windows operating systems
Remediation: Users should avoid copying and pasting code from untrusted sources and verify system messages before responding to them. Keeping antivirus software updated and using browser security settings can also help mitigate these risks.
Read Original

A new social engineering attack called ClickFix is targeting the hospitality industry in Europe by using fake Windows Blue Screen of Death (BSOD) screens. This scheme tricks users into believing their systems have crashed, prompting them to manually compile and run malicious software. The attackers are specifically focusing on employees in hotels and related businesses, making this a significant threat to sensitive customer data and operational continuity. Companies in this sector need to raise awareness among staff and implement training to recognize such scams. The use of a familiar error screen is particularly deceptive, as it plays on users' fears of system failures, leading them to take harmful actions without realizing the risks.

Impact: Hospitality sector systems, Windows operating systems
Remediation: Users should be trained to recognize social engineering tactics and avoid executing unknown programs. Regular software updates and security patches for operating systems should be applied. Implementing endpoint protection solutions may help detect and block malicious activities.
Read Original

A recent extended security update for Windows 11 inadvertently caused issues with Message Queuing (MSMQ), a feature important for enterprise background task management. This glitch could disrupt services for businesses that rely on MSMQ for their operations, potentially affecting data processing and communication between applications. Users of Windows 10 are now receiving an out-of-band update aimed at addressing these MSMQ problems. It is crucial for enterprises to apply this update promptly to ensure their systems remain stable and functional. Failure to do so could lead to significant operational delays and inefficiencies.

Impact: Windows 10, Windows 11
Remediation: Windows 10 OOB update released to fix MSMQ issues
Read Original

JumpCloud has identified a vulnerability in its Remote Assist feature for Windows that could allow attackers to escalate privileges locally or launch denial-of-service attacks on managed endpoints. This flaw affects systems running the JumpCloud Windows Agent, posing a risk to organizations that rely on this software for remote management. If exploited, the vulnerability could give unauthorized users elevated access to sensitive system functions, potentially leading to further malicious actions. Users and administrators of JumpCloud services should be aware of this issue and take steps to secure their systems. It's crucial for organizations to stay informed about such vulnerabilities to protect their data and infrastructure.

Impact: JumpCloud Remote Assist for Windows, JumpCloud Windows Agent
Remediation: Users should apply any available patches or updates from JumpCloud to mitigate the risk. Specific patch numbers or versions are not mentioned.
Read Original
JumpCloud Remote Assist Flaw Lets Users Gain Full Control of Company Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

A serious vulnerability identified as CVE-2025-34352 affects the JumpCloud Remote Assist for Windows agent, allowing local users to gain full SYSTEM privileges on company devices. Discovered by XM Cyber, this flaw poses a significant risk to organizations using the software, as it could enable unauthorized access and control over sensitive company systems. Businesses are strongly urged to update their JumpCloud software to version 0.317.0 or later to mitigate this high-severity security issue. Failure to address this vulnerability could lead to severe operational disruptions and data breaches. Immediate action is crucial to ensure the safety and integrity of company devices and networks.

Impact: JumpCloud Remote Assist for Windows, versions prior to 0.317.0
Remediation: Update to JumpCloud Remote Assist version 0.317.0 or later
Read Original
Page 1 of 2Next