lemmydev2

joined 2 years ago
 

Researchers have uncovered a sophisticated technique to bypass Windows Defender Application Control (WDAC), a critical Windows security feature designed to prevent unauthorized code execution. The bypass leverages vulnerabilities in trusted Electron applications, effectively circumventing one of Microsoft’s most robust security mechanisms aimed at high-assurance environments. By exploiting the underlying V8 JavaScript engine used in these […] The post Windows Defender Application Control Bypassed Using Operationalizing Browser Exploits appeared first on Cyber Security News.

 

The cyberattack that has targeted Marks & Spencer's (M&S) is the latest in a growing wave of cases involving something called sim-swap fraud. While the full technical details remain under investigation, a report in the Times suggests that cyber attackers used this method to access M&S internal systems, possibly by taking control of an employee's mobile number and convincing IT staff to reset critical login credentials.

 

A Kosovo national has been extradited to the United States to face charges of running an online cybercrime marketplace active since 2018. [...]

 

Flock, which has license plate readers (LPRs) all around the country, wants police to be able to “jump from LPR to person,” according to leaked audio obtained by 404 Media.

 

France’s interior minister says his government must “take measures to protect” crypto professionals after another kidnapping attempt. The post French minister steps in to help stop crypto kidnappings appeared first on Protos.

 

The race between cybersecurity professionals and malicious hackers has reached alarming speeds in 2025, with new data revealing that more than a quarter of software vulnerabilities are now exploited within 24 hours of disclosure. This rapidly shrinking window between vulnerability discovery and active exploitation forces organizations to rethink traditional patching cycles and implement more agile […] The post Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches appeared first on Cyber Security News.

 

Comments

 

Google is rolling out a change to Chromium that "de-elevates" Google Chrome so it does not run as an administrator to increase security in Windows. [...]

 

Insider risk is not just about bad actors. Most of the time, it’s about mistakes. Someone sends a sensitive file to the wrong address, or uploads a document to their personal cloud to work from home. In many cases, there is no ill intent, since many insider incidents are caused by negligence, not malice. Still, malicious insiders can be devastating. Some steal intellectual property, others are bribed or pressured by outside groups to plant ransomware, … More → The post Insider risk management needs a human strategy appeared first on Help Net Security.

 

Ivanti warned customers today to patch their Ivanti Endpoint Manager Mobile (EPMM) software against two security vulnerabilities chained in attacks to gain remote code execution. [...]

 

Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes. [...]

 

A single flip of a settings button enables a host of defenses against hacking.

view more: ‹ prev next ›