#windowsSecurity

Pen Test PartnersPTP@infosec.exchange
2025-12-04

We often find built-in Windows defences disabled or misconfigured during assessments. Those same controls can help stop credential theft, boot-level malware, and memory attacks when properly configured.

In our latest blog post, Nicole walks through five Windows security features you should be using, explains what they do, why they matter, and how to check them on your systems.

📌pentestpartners.com/security-b

#windowssecurity #incidentresponse #endpointsecurity #cybersecurity #dfir

2025-11-26

ASUS has patched a high-severity local privilege escalation flaw (CVE-2025-59373) in MyASUS that allowed elevation to NT AUTHORITY/SYSTEM via the System Control Interface Service. Patch now shipped through Windows Update with updated versions for x64 and ARM.

Full details:
technadu.com/asus-fixes-high-s

#infosec #vulnerability #ASUS #WindowsSecurity #patchmanagement #CVE2025

ASUS Fixes High-Severity MyASUS Vulnerability that Allows Privilege Escalation to SYSTEM-Level Access
2025-11-26

ClickFix operators are now using fake full-screen “Windows Update” pages to push victims into running malicious commands. Combined with steganographic loaders and in-memory execution, these campaigns continue to evolve.

What detection or user-training approach do you think works best today?

Source: helpnetsecurity.com/2025/11/25

Follow @technadu for ongoing threat-intel breakdowns and practical defense insights.

#Infosec #ThreatIntel #ClickFix #EDR #CyberHygiene #MalwareTrends #SecurityOps #WindowsSecurity #InfoStealer

Fake “Windows Update” screens fuels new wave of ClickFix attacks
2025-11-17

The decades-old Finger protocol is being abused in new ClickFix malware campaigns. Attackers are using Finger to pull remote commands onto Windows systems, leading to Python-based malware or NetSupport RAT infections. Newer variants even check for analysis tools before execution.

Anyone else seeing Finger traffic or legacy protocol misuse recently?
Follow for more updates.

#Malware #ClickFix #InfoSec #ThreatIntel #WindowsSecurity #CyberSecurity #RAT #LegacyProtocols #DefensiveSecurity

Decades-old ‘Finger’ protocol abused in ClickFix malware attacks
2025-11-03

Three Windows GDI flaws - including critical CVE-2025-53766 - could allow RCE or data leaks.
Patched across May–Aug 2025 updates.
Stay updated.
technadu.com/windows-gdi-flaws

#WindowsSecurity #CVE #RCE #InfoSec

Windows GDI Flaws Expose Systems to Critical Threats, Including RCE and Data Leaks
Henry Fisherhenry@techlore.tv
2025-04-22

The ULTIMATE Windows Privacy & Security Guide!

techlore.tv/w/gMiridfL1LHsto1D

Sascha Stumplersasstu@hessen.social
2025-10-30
2025-10-28

Qilin ransomware just upped its game—using Windows’ Linux subsystem to sneak past defenses. Could your system be the next target? Dive into how attackers are blurring the lines between OSes to fly under the radar.

thedefendopsdiaries.com/qilin-

#qilinransomware
#wslsecurity
#hybridthreats
#windowssecurity
#linuxransomware

2025-10-27

🚨 EDR-Redir exploit uses Windows’ Bind & Cloud Filter drivers to redirect or isolate EDR folders from user mode - no kernel privileges required.

Demoed by TwoSevenOneT, it breaks Elastic Defend, Sophos, and even disables Defender via CFAPI corruption.

Minifilter abuse is becoming the new weak link in EDR design.

💬 Thoughts on how vendors should adapt?
Follow TechNadu for continuous

#ThreatResearch and #EDREvasion updates.
#InfoSec #CyberSecurity #EDR #BYOVD #WindowsSecurity #MalwareAnalysis #RedTeam

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver
2025-10-25

Researchers have revealed a DPAPI-based Teams token theft method allowing attackers to decrypt locally stored authentication cookies and impersonate enterprise users.

⚙️ Technical context:
- Target: msedgewebview2.exe process spawned by Teams.
- Stores AES-256-GCM encrypted cookies in a SQLite database.
- Decryption possible by extracting os_crypt.encrypted_key from Local State and unprotecting via DPAPI.
- Enables attackers to read Teams/SharePoint data and send messages as victims.

💬 SOC/DFIR pros - what’s the best detection vector here? File I/O from WebView2? Suspicious DPAPI calls?

👍 Drop your hunting ideas below, like this post & follow @technadu for continuous threat research coverage.
#MicrosoftTeams #DPAPI #Forensics #DFIR #ThreatIntel #WindowsSecurity #InfoSec #AccessTokens #EDR #SOC #CyberDefense #TechNadu

Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens
Pen Test PartnersPTP@infosec.exchange
2025-10-17

When a breach occurs, it’s too late to wish you’d configured your logs...

Incident responders can only work with what’s there. Our latest blog post, written by Nicole, breaks down which logs provide the best chance of understanding what really happened and how to configure them before you need them, so you can get back to business as usual swiftly.

📌Read here: pentestpartners.com/security-b

#cybersecurity #incidentresponse #digitalforensics #sysmon #windowssecurity #infosec

2025-10-09

Heute ist der dritte Tag unserer Schulung, die sich vollständig der Sicherheit von Windows-Infrastrukturen widmet, wie sie heute typischerweise in Unternehmensnetzwerken betrieben werden.

Schwerpunkte der Schulung:
• Grundlagen von Verzeichnisdiensten
• Vorstellung von Angriffsvektoren mit Demos und Hands-on-Übungen
• Bedrohungsszenarien in Active Directory-Infrastrukturen
• Microsoft-Tiering-Modell zur Absicherung der Infrastruktur
• Vorstellung von Entra ID, seiner Funktionsweise und Möglichkeiten zur Absicherung
• Möglichkeiten zum gemeinsamen Betrieb von Active Directory und Entra ID

Unsere Trainer haben uns einige EindrĂźcke zukommen lassen.

Die nächste Schulung findet voraussichtlich vom 2 bis 4. Dezember 2025 in Mßnchen statt.
Jetzt Platz sichern unter: cirosec.de/trainings/hacking-u

#schulung #Training #ITSecurity #CyberSecurity #WindowsSecurity #ActiveDirectory #EnterpriseIT #ITInfrastructure
#HandsOnLearning

Heute ist der dritte Tag unserer Schulung, die sich vollständig der Sicherheit von Windows-Infrastrukturen widmet, wie sie heute typischerweise in Unternehmensnetzwerken betrieben werden.

Schwerpunkte der Schulung:
• Grundlagen von Verzeichnisdiensten
• Vorstellung von Angriffsvektoren mit Demos und Hands-on-Übungen
• Bedrohungsszenarien in Active Directory-Infrastrukturen
• Microsoft-Tiering-Modell zur Absicherung der Infrastruktur
• Vorstellung von Entra ID, seiner Funktionsweise und Möglichkeiten zur Absicherung
• Möglichkeiten zum gemeinsamen Betrieb von Active Directory und Entra ID

Unsere Trainer haben uns einige EindrĂźcke zukommen lassen.
2025-10-06

A major flaw in Unity could let hackers take control of your favorite games—putting millions at risk across multiple platforms. Are your gaming sessions suddenly vulnerable?

thedefendopsdiaries.com/unity-

#unityvulnerability
#cve202559489
#gamersafety
#cybersecurity
#infosec
#gameengine
#zeroday
#securitypatches
#databreach
#windowssecurity

PUPUWEB Blogpupuweb
2025-10-03

2025 ADMX templates boost security with app install controls (Windows 11), Excel external link blocking, Office AI settings, and Outlook migration management. Updates include 81+ new policies for SMB, printing, and Defender.

pupuweb.com/how-do-the-latest-

2025 ADMX templates boost security with app install controls (Windows 11), Excel external link blocking, Office AI settings, and Outlook migration management. Updates include 81+ new policies for SMB, printing, and Defender. #GroupPolicy #WindowsSecurity #ADMX
2025-09-08

New phishing campaign drops MostereRAT, targeting Windows via fake business inquiries. Attackers use AnyDesk/TightVNC for persistence, disable security tools, and secure C2 with mTLS. Fortinet & BeyondTrust warn of long-term control risks.

Full analysis: technadu.com/mostererat-phishi

#MostereRAT #Phishing #WindowsSecurity

Mostererat
Offensive Sequenceoffseq@infosec.exchange
2025-09-02

Silver Fox APT uses a signed Windows driver to drop ValleyRAT (HIGH severity). No CVE, but stealthy persistence and bypass of signature enforcement threaten EU orgs. Audit drivers, enhance EDR, hunt for ValleyRAT TTPs. radar.offseq.com/threat/silver #OffSeq #ThreatIntel #WindowsSecurity

High threat: Silver Fox APT Exploits Signed Windows Driver to Deliver ValleyRAT Malware
PUPUWEB Blogpupuweb
2025-08-31

Microsoft announced critical patches for two Windows security flaws (CVE-2025-55229 & CVE-2025-55230), but the updates are missing. Confused? Here's what you need to do to stay safe until the official fix is released.

pupuweb.com/what-windows-certi

Cyber Tips Guidecybertipsguide
2025-07-30

Hackers are abusing legitimate but vulnerable Windows drivers to sneak past security tools—a tactic called BYOVD. Make sure your team blocks risky drivers, uses Microsoft’s blocklist, & enables memory integrity.
🔗 zurl.co/ZdQQN

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst