Category Archives: News

Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in serious consequences. “The impact of these vulnerabilities range between remote code execution (RCE), full-service user takeover (which might provide powerful administrative access), manipulation of AI modules, exposing sensitive data, data

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE). “This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise, and unauthorized access to sensitive information

Announcing Windows 11 Insider Preview Build 22635.4010 (Beta Channel)

Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 22635.4010 (KB5041869) to the Beta Channel. REMINDER: Windows Insiders in the Beta Channel will receive updates based on Windows 11, version 23H2 via an enablement package (Build 22635.xxxx). For Insiders in the Beta Channel who want to be the first to get features gradually […]

Announcing Windows 11 Insider Preview Build 26120.1350 (Dev Channel)

Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 26120.1350 (KB5041871) to the Dev Channel. This update is delivered in a format that offers a preview of enhancements to servicing technology on Windows 11, version 24H2. To learn more, see https://aka.ms/CheckpointCumulativeUpdates. REMINDER: Windows Insiders in the Dev Channel will now receive updates […]

New AMD SinkClose flaw helps install nearly undetectable malware

AMD is warning about a high-severity CPU vulnerability named SinkClose that impacts multiple generations of its EPYC, Ryzen, and Threadripper processors. The vulnerability allows attackers with Kernel-level (Ring 0) privileges to gain Ring -2 privileges and install malware that becomes nearly undetectable. […]