Skip to main content

Posts

Showing posts from September, 2020

Microsoft’s Windows XP operating system (and other versions) source code has been leaked online

  The source code for Microsoft’s Windows XP operating system (and other versions) has been leaked online!  Published as a torrent file on bulletin board website 4chan, the 43GB data dump is said to have been compiled over the course of the last few months by the leaker. The collection also includes source code for Windows 2000 and multiple versions of Windows CE, MS DOS, Windows Embedded and Windows NT - but all of which have a smaller modern install base than XP. The individual responsible for the leak also appears to bear Bill Gates a distinct grudge, dedicating a whole section of the torrent file to videos slandering the Microsoft founder.  The legitimacy of the leaked code has not yet been confirmed, but Microsoft has been made aware of the issue. Although support for Windows XP lapsed in 2014 - meaning the OS has not received security updates for a number of years - a surprising number of users remain loyal to the outdated operating system. As of last month, 1.26% of all laptops

Google rolls out new automated threat detection tool

Google and its subsidiary Chronicle are rolling out new automated threat detection capabilities for its Google Cloud platform to help companies scale up security monitoring for their legacy systems. The product – called Chronicle Detect – has been in the works for some time and Google unveiled some details around certain components earlier this year at RSA, like a data fusion model to create timelines, a rules engine for common events and incorporated YARA malware threat behavior language. Often, log data or telemetry from a company’s older, off-the-shelf or internal applications aren’t set up to integrate with or port to modern threat detection and response platforms. That can make consistent, continuous security monitoring harder and create visibility gaps for huge chunks of enterprise. In a release, Sunil Potti, Google’s general manager and vice president of engineering, and Rick Caccia, head of marketing for Google’s Cloud Security team, said the new capabilities were designed to a

WhatsApp Discloses 6 Bugs That Allows Attackers to Execute Code Remotely

WhatsApp disclosed 6 security bugs through their dedicated security advisory site that allows attackers to execute remote code. WhatsApp is a messaging app used by more than two billion users around the world. All the vulnerabilities are disclosed in dedicated security advisory site aimed to provide more transparent details about vulnerabilities for users and security professionals. “We take the security of our users very seriously and we provide industry-leading protection for our users around the world. Our security team at WhatsApp works with experts around the world to stay ahead of potential threats,” reads the blog post. 6 Security WhatsApp Bugs CVE-2020-1894 – A stack write overflow Bug in WhatsApp Business for Android CVE-2020-1891 -A user controlled parameter used in video call in WhatsApp for Android CVE-2020-1890 – A URL validation issue in WhatsApp for Android CVE-2020-1889 – security feature bypass issue in WhatsApp Desktop versions CVE-2020-1886 – A buffer overflow in Wha

Cisco Warns Hackers Actively Exploited Bug in Carrier-grade Routers

Cisco warned users that the hackers actively exploited a bug in carrier-grade-routers, and it was a zero-day vulnerability affecting the Internetwork Operating System (IOS) that boats with its networking devices.  The security experts termed the vulnerability as CVE-2020-3566, and it affects the Distance Vector Multicast Routing Protocol (DVMRP) feature of its operating system. Cisco’s IOS XR Network OS is disposed of various router programs, which include NCS 540 & 560, NCS 5500, 8000, and ASR 9000 series routers. And till now, Cisco hasn’t issued any software update for this vulnerability. Flaw Details Advisory ID: cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz First issued: 2020 August 29 Last updated: 2020 August 31 Version 2.0: Interim Workarounds: No workarounds  CVE IDs: CVE-2020-3566, CVE-2020-3569 Cisco Bug IDs: CSCvr86414, CSCvv54838 CWE ID: CWE-400 CVSS Score: Base 8.6 Affected Products These vulnerabilities attack any Cisco device that is operating any release of Cisco IOS XR Sof

Crysis Remastered system requirements might not trouble your PC

 Crysis Remastered releases September 19 following a two-month delay after a famously underwhelming trailer. Ahead of the release, the official system requirements have been published on the Epic Games Store, and if you were worried that the famously hardware hungry shooter would challenge your current rig, you can probably breathe a sigh of relief. Still, it's unclear how the 'recommended' specs below apply if you're hoping to take complete advantage of the game's software ray tracing and still see decent performance. It's possible to get ray tracing running on non-RTX cards via proprietary game engine software or DirectX12's API , but for Crysis Remastered to work optimally on these relatively low specs it will rely entirely on CryEngine trickery, which has an "API-agnostic ray tracing solution". The remaster also boasts better textures, improved assets, SSDO, SVOGI, "state-of-the-art depth fields," particles effects and much more. Here