Articles tagged "Windows"

Found 28 articles

A new banking malware known as VENON has been discovered, targeting 33 banks in Brazil. This malware is notable for being written in Rust, which differentiates it from other prevalent malware in the region that typically uses Delphi. It specifically aims to steal user credentials by infecting Windows systems. Researchers first identified VENON last month, raising concerns about its potential impact on Brazilian banking customers. This malware represents an evolving threat in the Latin American cybercrime landscape, and users should be vigilant about their online security.

Impact: 33 Brazilian banks, Windows systems
Remediation: Users should ensure their antivirus software is up to date and be cautious when entering personal information online.
Read Original

A Chinese-speaking cyber actor has reportedly been targeting critical sectors in Asia for several years using a mix of custom malware, open-source tools, and living-off-the-land (LOTL) binaries. This activity appears to be focused on espionage, affecting both Windows and Linux systems. The attackers' tactics, which combine tailored malware with readily available tools, suggest a sophisticated approach aimed at infiltrating sensitive networks. The long-term nature of this threat raises concerns for organizations in the region, as prolonged access could lead to significant data breaches and intelligence gathering. Companies in critical infrastructure sectors need to be vigilant and enhance their cybersecurity measures to defend against these persistent threats.

Impact: Windows and Linux systems in critical Asian sectors
Remediation: Organizations should conduct regular security audits, implement advanced threat detection solutions, and ensure all systems are patched and updated to mitigate risks.
Read Original

Despite the widespread implementation of multi-factor authentication (MFA) in organizations, many still fall victim to credential theft. Attackers are exploiting valid usernames and passwords to gain unauthorized access to networks, particularly in Windows environments. The problem isn't with MFA itself, but rather with how comprehensively it is enforced through identity providers like Microsoft Entra ID and Okta. If MFA isn't applied consistently across all access points, attackers can bypass these security measures. This situation emphasizes the need for companies to ensure that MFA is enforced everywhere, not just in select areas, to truly safeguard their systems from credential abuse.

Impact: Microsoft Entra ID, Okta, Windows environments
Remediation: Ensure comprehensive enforcement of MFA across all access points and systems
Read Original

In February 2026, Microsoft addressed over 50 security vulnerabilities during its Patch Tuesday update, including six zero-day flaws that were actively exploited by attackers. Notably, three of these zero-days involve security feature bypasses. One of the vulnerabilities, identified as CVE-2026-21513, impacts the MSHTML/Trident browser engine used in Internet Explorer on Windows, while CVE-2026-21514 affects Microsoft Word. Attackers can exploit these vulnerabilities by tricking users into opening malicious files or links. As these security holes are actively being exploited, users and organizations must apply the updates promptly to protect their systems from potential breaches.

Impact: Microsoft Windows (Internet Explorer), Microsoft Word
Remediation: Users are advised to install the latest security updates from Microsoft to mitigate these vulnerabilities. Specific patches addressing these issues were released as part of the February 2026 Patch Tuesday.
Read Original

A North Korea-associated hacking group known as UNC1069 is targeting cryptocurrency organizations to steal sensitive information from both Windows and macOS systems. Their approach involves social engineering tactics, including the use of a compromised Telegram account to set up a fake Zoom meeting. This deception leads victims to download malware through a method called ClickFix, which researchers believe may also utilize AI-generated content to enhance its effectiveness. The implications of these attacks are significant, as they not only threaten the financial security of targeted companies but also highlight the evolving tactics used by cybercriminals in the cryptocurrency sector. Protecting against such sophisticated schemes is increasingly critical for organizations in this space.

Impact: Windows and macOS systems, cryptocurrency organizations
Remediation: Organizations should implement strong security protocols, educate employees about social engineering tactics, and monitor communications for suspicious activity.
Read Original
UK Construction Firm Hit by Prometei Botnet Hiding in Windows Server

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A UK construction firm has fallen victim to an attack by the Russian Prometei botnet, as detailed by cybersecurity firm eSentire. The attack involved the use of TOR for anonymity, and attackers focused on stealing passwords and employing decoy tactics to mislead security measures. This incident raises concerns about the security of critical infrastructure in the construction sector, which may not be as fortified against cyber threats as other industries. The implications are significant, as compromised systems can lead to operational disruptions and financial losses for businesses. Companies in similar sectors should take note and assess their own cybersecurity defenses to prevent similar attacks.

Impact: UK construction firm's Windows Server systems
Remediation: Implement strong password policies, enhance network monitoring, and consider using intrusion detection systems.
Read Original

Avast has rolled out two new security features aimed at detecting scams involving deepfake technology. The Avast Scam Guardian and Scam Guardian Pro are now available for mobile devices, while the Avast Deepfake Guard is launched for Windows PCs. This AI-driven tool is designed to analyze and identify harmful audio that could be embedded within video content. The goal is to enhance protection for users against various scam tactics that can occur through text messages, phone calls, and video platforms. These updates are particularly relevant as the rise of deepfakes poses a growing risk to online security, making it essential for users to have reliable tools to safeguard against such threats.

Impact: Avast Scam Guardian, Scam Guardian Pro, Avast Deepfake Guard, Windows PCs, mobile devices
Remediation: Users should install Avast Scam Guardian, Scam Guardian Pro, and Avast Deepfake Guard to enhance their protection against scams.
Read Original
Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A new form of malware, known as Pulsar RAT, is being used by hackers to conduct live chat sessions with victims while simultaneously stealing sensitive data. This malware operates on Windows systems, allowing attackers to engage with users in real-time, making it more personal and deceptive. The presence of live chat functionality means that victims may not realize they are being compromised until it's too late. Researchers are warning that this method poses a significant risk to both individuals and organizations, as it can lead to the unauthorized access of personal and financial information. Users are urged to remain vigilant and ensure their systems are secure against such threats.

Impact: Windows systems
Remediation: Users should ensure their antivirus software is up to date and consider employing additional security measures such as firewalls and intrusion detection systems.
Read Original

Microsoft is looking into issues with some Windows 11 devices that are failing to boot after users installed the January 2026 Patch Tuesday security updates. Affected users are encountering 'UNMOUNTABLE_BOOT_VOLUME' errors, which prevent their systems from starting up properly. This situation could disrupt the workflow of many individuals and organizations that rely on Windows 11 for daily operations. Microsoft has not yet provided a specific fix or workaround for the problem, leaving users uncertain about how to resolve the issue. The investigation is ongoing as the company seeks to identify the root cause of the boot failures and implement a solution.

Impact: Windows 11 devices
Remediation: N/A
Read Original
FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys

Hackread – Cybersecurity News, Data Breaches, AI, and More

In a recent incident, the FBI accessed the BitLocker recovery keys of Windows laptops after Microsoft shared these keys as part of a legal request. This situation raises significant concerns about user privacy and data security, as it reveals how easily law enforcement can obtain sensitive information stored on personal devices. Affected users include anyone using Windows laptops that utilize BitLocker encryption for data protection. The implications are serious; users may feel their encrypted data is not as secure as previously thought, prompting a reevaluation of reliance on built-in security features. This incident serves as a reminder that while encryption is a valuable tool, it does not guarantee absolute privacy when legal authorities are involved.

Impact: Windows PCs utilizing BitLocker encryption
Remediation: Users should consider additional layers of security, such as using personal encryption solutions or regularly updating privacy settings.
Read Original

Microsoft has issued a temporary workaround for users experiencing freezes in Outlook after applying the latest Windows security updates. This issue has affected many customers who rely on Outlook for their email and daily tasks, causing disruptions and frustration. The freezes appear to be linked to the recent updates, prompting Microsoft to step in with a solution while they work on a permanent fix. Users are advised to implement the provided workaround to mitigate the impact on their productivity. This situation serves as a reminder of how software updates, while important for security, can sometimes lead to unexpected problems.

Impact: Outlook, Windows
Remediation: Temporary workaround provided by Microsoft
Read Original

Microsoft has rolled out emergency updates for Windows 10, Windows 11, and Windows Server to address issues that arose from the January Patch Tuesday updates. These out-of-band updates specifically target problems related to system shutdowns and Cloud PC functionality. Users of these operating systems may experience disruptions due to these bugs, which could impact productivity and system reliability. It's crucial for users to apply these updates promptly to ensure their systems operate smoothly and to mitigate any potential security risks that may arise from unresolved bugs.

Impact: Windows 10, Windows 11, Windows Server
Remediation: Users should apply the emergency updates provided by Microsoft to resolve the shutdown and Cloud PC issues.
Read Original

The January Patch Tuesday updates for Windows include important changes to Secure Boot, which safeguards computers against bootkit malware. Secure Boot is a security feature that ensures only trusted software is loaded during the startup process. The updates address expiring certificates that could compromise this protection if not renewed. Users and IT administrators are urged to install these patches promptly to mitigate the risk of bootkit attacks, which can allow malicious software to take control of a system before the operating system loads. Keeping Secure Boot updated is crucial for maintaining the integrity and security of Windows PCs.

Impact: Windows PCs with Secure Boot enabled
Remediation: Install the January Patch Tuesday updates for Windows to refresh Secure Boot certificates.
Read Original
Actively Exploited

Attackers are employing a combination of social engineering tactics, including fake CAPTCHAs and counterfeit Blue Screen of Death (BSOD) messages, to trick users into executing harmful code. This method, known as ClickFix, prompts victims to copy and paste malicious scripts, potentially compromising their systems. The attacks primarily target unsuspecting Windows users who may panic upon seeing the fake BSOD, believing their computer has crashed. It's crucial for users to be aware of these tactics and to verify the legitimacy of any error messages before taking action. This incident serves as a reminder of the importance of maintaining vigilance against deceptive online threats.

Impact: Windows operating systems
Remediation: Users should avoid copying and pasting code from untrusted sources and verify system messages before responding to them. Keeping antivirus software updated and using browser security settings can also help mitigate these risks.
Read Original

A new social engineering attack called ClickFix is targeting the hospitality industry in Europe by using fake Windows Blue Screen of Death (BSOD) screens. This scheme tricks users into believing their systems have crashed, prompting them to manually compile and run malicious software. The attackers are specifically focusing on employees in hotels and related businesses, making this a significant threat to sensitive customer data and operational continuity. Companies in this sector need to raise awareness among staff and implement training to recognize such scams. The use of a familiar error screen is particularly deceptive, as it plays on users' fears of system failures, leading them to take harmful actions without realizing the risks.

Impact: Hospitality sector systems, Windows operating systems
Remediation: Users should be trained to recognize social engineering tactics and avoid executing unknown programs. Regular software updates and security patches for operating systems should be applied. Implementing endpoint protection solutions may help detect and block malicious activities.
Read Original
Page 1 of 2Next