1010.cx

  • End of Support for Windows 10 Sparks Security Fears Among Millions of Users

    ·

    cyber security, Cyber Security News, Windows

    Microsoft officially ended support for Windows 10 on October 14, 2025, leaving millions of users worldwide facing critical security concerns. The decision marks the end of regular technical assistance, feature updates, and security patches for one of the most widely used operating systems in history. Growing Security Vulnerabilities Put Users at Risk Without ongoing security […]

    The post End of Support for Windows 10 Sparks Security Fears Among Millions of Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code

    ·

    cyber security, Cyber Security News, vulnerability, Vulnerability News

    Microsoft has patched a critical flaw in its Remote Desktop Client that could allow attackers to execute malicious code on victims’ systems.

    Disclosed on October 14, 2025, as CVE-2025-58718, the vulnerability stems from a use-after-free error, earning an “Important” severity rating.

    While not yet exploited in the wild, security experts warn that it poses a significant risk to Windows users relying on remote access tools.

    The flaw affects the Remote Desktop Client, a core component for connecting to remote machines. An unauthorized attacker could leverage it over a network by tricking a user into connecting to a malicious RDP server.

    Windows Remote Desktop Client RCE Vulnerability

    Once connected, the server exploits the use-after-free bug to run arbitrary code in the user’s context, potentially leading to full system compromise.

    This requires user interaction, such as clicking a phishing link or accepting a bogus connection, but demands no privileges from the attacker.

    The Common Vulnerability Scoring System (CVSS) rates it at 8.8 out of 10, highlighting high impacts on confidentiality, integrity, and availability.

    MetricValue
    Attack VectorNetwork
    Attack ComplexityLow
    Privileges RequiredNone
    User InteractionRequired
    ScopeUnchanged
    ConfidentialityHigh
    IntegrityHigh
    AvailabilityHigh
    Exploit MaturityUnproven

    Microsoft classifies exploitation as “less likely” due to the need for port redirection, which is disabled by default.

    Users should apply the October 2025 Patch Tuesday updates immediately to mitigate risks. Enable automatic updates and avoid connecting to untrusted RDP servers.

    For organizations, segmenting networks and training on phishing awareness can further reduce exposure. As remote work persists, this vulnerability underscores the ongoing need for vigilant endpoint security.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops

    ·

    cyber security, Cyber Security News

    Security researchers have uncovered critical vulnerabilities in signed UEFI shells that allow attackers to completely bypass Secure Boot protections on approximately 200,000 Framework laptops and desktops. These flaws expose a fundamental weakness in firmware security that could enable persistent, undetectable malware infections at the most privileged system level. The vulnerabilities center around legitimate diagnostic tools […]

    The post UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

    ·

    cyber security, Cyber Security News, vulnerability, Vulnerability News

    Google has rolled out an urgent security update for its Chrome browser, addressing a high-severity use-after-free vulnerability that could allow attackers to execute arbitrary code on users’ systems.

    The patch is included in version 141.0.7390.107 for Linux and 141.0.7390.107/.108 for Windows and macOS, which began deploying to the Stable channel this week.

    Full release notes detail the changes, with the update expected to reach most users over the coming days or weeks.

    Chrome Use After Free Vulnerability

    The flaw, tracked as CVE-2025-11756, resides in Chrome’s Safe Browsing feature, a core component designed to protect users from malicious websites and phishing attempts.

    Discovered by independent researcher “as nine” on September 25, 2025, the vulnerability earned a $7,000 bounty under Google’s Vulnerability Reward Program.

    Use-after-free errors occur when software continues to reference memory that has already been freed, potentially leading to crashes, data corruption, or exploitation.

    In this case, attackers could leverage the bug to inject and run malicious code, bypassing security sandboxes and compromising the entire browser environment.

    Google classifies the issue as high severity, emphasizing its potential for remote exploitation without user interaction. Simply visiting a rigged webpage could trigger the attack.

    While no widespread exploits have been reported in the wild, the company restricted bug details initially to ensure most users update before details go public.

    This aligns with Chrome’s proactive security stance, where access to full disclosures is often delayed until patches propagate.

    The fix was enhanced by Google’s suite of detection tools, including AddressSanitizer, MemorySanitizer, and libFuzzer, which assist in identifying memory-related bugs early in development.

    Google also extended thanks to external researchers for their contributions during the cycle, preventing other flaws from slipping into stable releases.

    Users should update Chrome immediately via the browser’s settings menu or automatic rollout. As browser-based threats evolve, this incident underscores the importance of timely patching in defending against sophisticated attacks.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

    ·

    SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS Java that could result in arbitrary command execution. The vulnerability, tracked as CVE-2025-42944, carries a CVSS score of 10.0. It has been described as a case of insecure deserialization. “Due to a deserialization vulnerability in SAP NetWeaver, an

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Pixnapping Attack Hijacks Google Authenticator 2FA Codes in Under 30 Seconds

    ·

    cyber security, Cyber Security News, Google, Google Authenticator

    Security researchers have unveiled a sophisticated new attack technique dubbed “Pixnapping” that can extract two-factor authentication codes from Google Authenticator and other sensitive mobile applications in under 30 seconds. Pixnapping leverages fundamental features of Android’s graphics rendering system to create a side-channel attack that steals pixel data from victim applications. Unlike traditional browser-based pixel-stealing attacks […]

    The post Pixnapping Attack Hijacks Google Authenticator 2FA Codes in Under 30 Seconds appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Exploit Windows Remote Access Connection Manager 0-Day in Ongoing Attacks

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability, Windows

    Microsoft has confirmed active exploitation of a critical zero-day vulnerability affecting the Windows Remote Access Connection Manager, designated as CVE-2025-59230. The security flaw, disclosed on October 14, 2025, allows attackers with limited system access to escalate their privileges to the highest level, gaining complete control over compromised systems. Zero-Day Vulnerability Enables System-Level Access The vulnerability […]

    The post Hackers Exploit Windows Remote Access Connection Manager 0-Day in Ongoing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Telegram Becomes the Nerve Center for Modern Hacktivist Operations

    ·

    cyber security, Cyber Security News, Telegram

    Telegram has solidified its position as the primary coordination hub for modern hacktivist operations, according to comprehensive research analyzing over 11,000 posts from more than 120 politically motivated threat actor groups. Contrary to assumptions that such activities remain hidden in dark web forums, the research reveals that most hacktivist planning and mobilization occurs in plain […]

    The post Telegram Becomes the Nerve Center for Modern Hacktivist Operations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NCSC Issues Warning as UK Sees Four Cyber Attacks a Week

    ·

    Cyber Attack, cyber security, Cyber Security News, NCSC

    British organisations are facing an unprecedented cyber security crisis as the National Cyber Security Centre reveals a dramatic surge in attacks threatening the nation’s digital infrastructure. This alarming escalation translates to an average of four major cyber attacks targeting UK interests every single week. The severity of cyber threats facing Britain has intensified substantially, with […]

    The post NCSC Issues Warning as UK Sees Four Cyber Attacks a Week appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Pro-Russian Hacktivists Target Government, Finance and E-Commerce Sites

    ·

    cyber security, Cyber Security News, Hacktivists

    The pro-Russian hacktivist collective NoName057(16) has emerged as a notable participant in a coordinated wave of cyberattacks targeting Israeli infrastructure during the October 7 anniversary period. The group claimed responsibility for multiple distributed denial-of-service (DDoS) attacks against government portals, financial institutions and online commerce platforms, marking a significant escalation in hacktivist operations aligned with pro-Palestinian […]

    The post Pro-Russian Hacktivists Target Government, Finance and E-Commerce Sites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 319 320 321 322 323 … 552
Next Page

1010.cx

cybersecurity / defense / intelligence