Connect with us
Vulnerability in Windows Defender allows you to see the list Vulnerability in Windows Defender allows you to see the list

Security

Vulnerability in Windows Defender allows you to see the list of scan exclusions

Published

on

The issue has been around for at least eight years and affects versions of Windows 10 21H1 and Windows 10 21H2.

image

Cybersecurity Researcher at SentinelOne discovered dangerous vulnerability in Windows Defender. Its operation allows attackers to find out the places on the system that are excluded from scanning by the anti-virus solution, and place malware there.

According to some users, the problem exists has been at least eight years old and affects versions of Windows 10 21H1 and Windows 10 21H2.

Like any antivirus solution, Microsoft Defender allows you to add locations (local or network) on your systems to exclude from malware scanning. Typically, such exclusions are needed to prevent antivirus software from interfering with the functionality of legitimate applications that are erroneously identified as malware.

Since the list of scan exclusions differs from one user to another, this information is extremely useful for attackers. Criminals can place malicious files in safe places without fear of being detected.

As the information security expert noted, any local user can access the list of locations excluded from scanning by Windows Defender. This information is not protected in any way and running the reg query command reveals all exceptions for scanning, whether they are files, folders, extensions or processes.

According to information security specialist Nathan McNulty problem is present in Windows 10 versions 21H1 and 21H2, but does not affect Windows 11. In addition, the vulnerability allows you to get a list of exceptions from the registry tree with entries that store group policy settings. This information is more sensitive because it provides exceptions for multiple computers.

.

Click to comment

Leave a Reply

Your email address will not be published.

Phones

Possibly hundreds of millions of smartphones are at risk. A vulnerability has been discovered that manufacturers are in no hurry to fix

Published

on

Possibly hundreds of millions of smartphones are at risk A

Google, as part of its Project Zero project, has published information about a new vulnerability CVE-2022-33917 that affects millions of smartphones.

Possibly hundreds of millions of smartphones are at risk.  A vulnerability has been discovered that manufacturers are in no hurry to fix

The fact is that we are talking about a vulnerability in Mali GPUs, which are used in a huge number of single-chip systems. Google does not specify, but the Arm website has information that the vulnerability affects solutions based on the Valhall architecture. And this means that we are talking about a huge number of graphics cores that have been and are being used in SoCs in recent years, including the latest Mali-Gx10. That is, we are not talking about millions of vulnerable smartphones, but rather hundreds of millions of devices based on SoC MediaTek, Exynos and Tensor.

Arm itself patched the vulnerability some time ago, but the problem is that many vendors still haven’t implemented those patches. This applies to many devices from Samsung, Xiaomi, Oppo and even Google itself.

If exploited, the vulnerability is intended to allow an attacker to read and write physical pages after they are returned to the system, potentially gaining wide access to user data.

Continue Reading

Gaming

Elon Musk invited a famous hacker of iPhone and PlayStation consoles to Twitter

Published

on

Elon Musk invited a famous hacker of iPhone and PlayStation

Elon Musk hired a hacker who created the world’s first iPhone jailbreak in 2007 and bypassed Sony consoles in 2010. We are talking about George Hotz (George Hotz), known under the nickname Geohot. He also founded the startup Comma.ai, where an autopilot system for cars is being developed.

Elon Musk invited a famous hacker of iPhone and PlayStation consoles to Twitter

In 2015, Hotz began building his own autopilot and offered Musk a license. Instead, the businessman invited a specialist to Tesla, but Hotz refused.

A November 16 Hotz wrote on Twitter, which supports Musk’s decisions about the “hardcore mode of operation.” He also stated that he was ready for an internship at Twitter with a minimum pay that is equal to the cost of living in San Francisco. Musk answered and invited the developer to Twitter.

Elon Musk invited a famous hacker of iPhone and PlayStation consoles to Twitter

George Hotz

First, the specialist will improve the advanced search in the social network so that users no longer set filters manually.

Earlier it was reported that Musk took up the “fire servers.”

Continue Reading

Security

Hackers hacked one of Nvidia’s Twitter accounts to “advertise” Dogecoin

Published

on

Hackers hacked one of Nvidias Twitter accounts to advertise Dogecoin

The official Nvidia Taiwan Twitter account has been hacked.

Hackers hacked one of Nvidia's Twitter accounts to

This account has been inactive since 2019, but today unexpectedly posted posts related to the Dogecoin cryptocurrency. Given the recent purchase of Twitter by Elon Musk and his love for this cryptocurrency, the situation looks quite funny.

Be that as it may, the attackers published a record about a certain Dogeathon 2022 event and added a link to the record. Of course, the link was used for phishing.

The account is currently suspended. Nvidia itself has not yet commented on the situation.

Continue Reading

Most Popular