bypass

AppWizard
November 6, 2024
A new Android malware named "ToxicPanda" was first identified in late October 2024 and has been reclassified as a unique entity after initial classification under the TgToxic family. It poses a risk through account takeover via on-device fraud and primarily targets retail banking applications on Android devices. The malware has spread significantly in Italy, Portugal, Spain, and various Latin American regions, with over 1,500 devices reported as victims. ToxicPanda allows cybercriminals to gain remote access to infected devices, intercept one-time passwords, and bypass two-factor authentication. The threat actors are likely Chinese speakers, which is unusual for targeting European banking. The malware spreads through social engineering tactics, encouraging users to side-load the malicious app, and exploits Android’s accessibility services for elevated permissions. Cleafy’s analysis indicates that ToxicPanda's command-and-control infrastructure shows evolving operational strategies, and the malware may undergo further modifications. The challenges for security professionals are increasing as malware operators refine their tactics and expand their targets. Cleafy noted that contemporary antivirus solutions have struggled to detect ToxicPanda due to a lack of proactive, real-time detection systems.
AppWizard
November 5, 2024
Google is developing a feature for its Play Store that allows users to temporarily pause Play Protect for one day instead of disabling it completely. This feature aims to enhance user safety by automatically reactivating Play Protect after the pause period and includes a warning prompt about potential scams when users attempt to pause or turn off the security feature. The feature is expected to be available to users in the near future.
Winsage
November 3, 2024
Windows 10 will reach its end-of-support date on October 14, 2025, after which it will no longer receive updates, including security patches. Users can choose to continue using Windows 10, buy new hardware, switch to a Linux distribution or ChromeOS Flex, pay for Extended Security Options (ESUs) from Microsoft, or attempt to upgrade incompatible hardware to Windows 11 despite potential risks. The final version of Windows 10, 22H2, will receive monthly security updates until the end-of-support date.
Winsage
November 1, 2024
Microsoft has changed its policies regarding the enablement and disablement of the New Outlook for Windows and Outlook for the web, leading to user dissatisfaction, particularly among those who prefer the Classic Outlook. A Reddit user discovered a method to bypass the installation of the New Outlook by uninstalling it, pausing its installation in the Microsoft Store, and closing the Store, creating a loop that prevents the New Outlook from appearing upon restarting the computer. However, this workaround may not be a permanent solution, as Microsoft could address it in future updates.
Winsage
November 1, 2024
Microsoft will end support for Windows 10 in October 2025 and has announced costs for extending updates. Businesses can enroll in the Extended Security Updates (ESU) program for up to 0 per device for a three-year extension. Home users can extend support for one year at a cost of . Education license holders benefit from lower fees: for the first year, for the second, and 0 for the third, totaling 5 for three years. An alternative service, 0Patch, offers security patches for Windows 10 post-support for approximately per year, committing to support until at least 2030.
Winsage
October 31, 2024
Researchers from 0patch discovered a new zero-day vulnerability, CVE-2024-38030, while developing a micropatch for an existing Windows security flaw, CVE-2024-21320, which allowed attackers to extract NT Lan Manager user credentials through malicious Windows theme files. Microsoft’s patch for CVE-2024-21320 did not fully address all potential credential leakage scenarios, prompting the identification of the new vulnerability. 0patch created a more general patch for Windows theme files that covers all execution paths leading to credential leakage. Microsoft has acknowledged the new vulnerability and is working on a fix, but an official patch has not yet been released. Meanwhile, 0patch users can install a micropatch to protect their systems.
Search