Windows

Signal Gives Microsoft a Clear Signal: Do NOT Recall This
Richi Jennings | | AI, AI (Artificial Intelligence), AI training, Artificial Intelligence, Artificial Intelligence (AI), Artificial Intelligence (AI)/Machine Learning (ML), artificial intellignece, artificialintelligence, breach of privacy, Copilot, cybersecurity risks of generative ai, Data Privacy, Digital Privacy, generative AI, Generative AI risks, Health Insurance Portability and Accountability Act (HIPAA), HIPAA, HIPAA and IT Security, HIPAA Compliance, hipaa laws, HIPPA, Large Language Model, large language models, Large Language Models (LLM), Large language models (LLMs), LLM, LLMs, machine learning, Microsoft, ML, Privacy, Recall, SB Blogwatch, signal, Signal app, Windows
Black screen of DRM: Privacy-first messenger blocks Microsoft Recall ...
Security Boulevard
Emulating the Hellish Helldown Ransomware
AttackIQ has released a new attack graph emulating the behaviors exhibited by Helldown ransomware since its emergence in August 2024. Helldown is operated by the eponymous and still largely undocumented adversary, which ...

Microsoft Moves Forward With Controversial Recall Feature
Microsoft a year ago was about to launch Recall, a Windows feature for Copilot+ PCs that takes regular screenshots of users' systems and stores them so they can be searched for later ...
Security Boulevard

Microsoft Won’t Fix This Bad Zero Day (Despite Wide Abuse)
Richi Jennings | | .lnk, APT37, APT43, BitterAPT, china espionage, CWE-451, Cybersecurity zero-day flaw, Earth Anansi, Earth Imp, Earth Kumiho, Earth Manticore, Evil Corp., InkySquid, Iranian hackers, kimsuky, Kimsuky hacking group, Konni, LNK file malware, LNKFiles, malicious LNK files, Microsoft, Microsoft Windows Zero Day, North Korean cyber espionage, russia hacker, SB Blogwatch, ScarCruft, Windows, ZDI-CAN-25373, Zero Day Attacks, zero day exploit attack, Zero Day Initiative, Zero Day Initiative (ZDI), zero-day, zero-day attack, Zero-Day Bug
Satya says NO: Redmond blames Windows users, rather than solve 30-year-old bug—exploited since 2017 ...
Security Boulevard
Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
Overview Recently, NSFOCUS CERT detected that Microsoft released a security announcement and fixed the spoofing vulnerability of Windows File Explorer (CVE-2025-24071), with a CVSS score of 7.5. Due to the implicit trust ...
Microsoft Security Update Notification in February of High-Risk Vulnerabilities in Multiple Products
NSFOCUS | | Blog, CVE-2025-21391, CVE-2025-21418, Emergency Response, Microsoft, Microsoft vulnerabilities, Windows, Windows vulnerability
Overview On February 12, NSFOCUS CERT detected that Microsoft released a security update patch for February, which fixed 63 security issues involving widely used products such as Windows, Microsoft Office, Azure, Apps, ...
Microsoft’s January Security Update of High-Risk Vulnerabilities in Multiple Products
NSFOCUS | | azure, Blog, Emergency Response, Microsoft Dynamics, Microsoft Edge, Microsoft Office, Microsoft Visual Studio, Windows
Overview On January 14, NSFOCUS CERT detected that Microsoft released a security update patch for January, which fixed 159 security problems in widely used products such as Windows, Microsoft Office, Microsoft Visual ...
Microsoft’s December Security Update of High-Risk Vulnerabilities in Multiple Products
NSFOCUS | | Blog, Emergency Response, Microsoft Office, Microsoft Sharepoint, Windows, Windows LDAP, Windows Remote Desktop Services, Windows vulnerability
Overview On December 11th, NSFOCUS CERT monitored that Microsoft released the December security update patch, fixing 72 security issues involving widely-used products such as Windows, Windows LDAP, Microsoft Office, Windows Remote Desktop ...

Microsoft Veeps Ignite Fire Under CrowdStrike
Richi Jennings | | CrowdStrike, CrowdStrike Falcon, CrowdStrike incident;, crowdstrike updates, David Weston, ignite, Microsoft, Microsoft security, Microsoft Virus Initiative, Microsoft Windows, Quick Machine Recovery, rust, Safe Deployment Practices, SB Blogwatch, Windows, Windows security
BSODs begone! Redmond business leaders line up to say what’s new in Windows security ...
Security Boulevard

Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS
Richi Jennings | | CVE-2024-38014, CVE-2024-38217, CVE-2024-38226, CVE-2024-43491, KB5043083, KB5043936, Mark of the Web, Microsoft, Microsoft Patch Tuesday September 2024, Microsoft Windows, Microsoft Windows Zero Day, Patch Tuesday, SB Blogwatch, Windows, Windows Update
Week B: Bugs begone! This month Redmond fixes 79 security flaws in Windows and other products ...
Security Boulevard