costs

Winsage
August 11, 2025
Security researchers have identified a "zero-click" denial-of-service (DoS) exploit that can covertly turn Microsoft Windows Domain Controllers (DCs) into a global botnet. DDoS attacks increased by 56% year-over-year in late 2024, with Cloudflare blocking an attack that peaked at 7.3 Tbps in 2025. The average minute of downtime from these attacks costs businesses approximately ,000, with incidents for small and midsize firms exceeding 0,000. The exploit, known as Win-DDoS, leverages the Lightweight Directory Access Protocol (LDAP) client in Windows, allowing DCs to automatically target victim servers through LDAP referrals without user interaction. This results in thousands of DCs inadvertently overwhelming a target with TCP traffic. Four vulnerabilities (CVEs) related to this exploit were disclosed to Microsoft in March 2025 and addressed in subsequent patch releases in June and July 2025. These vulnerabilities include: - CVE-2025-32724: LSASS (LDAP client) - None needed, causes memory exhaustion/DC crash, patched June 2025. - CVE-2025-26673: NetLogon (RPC) - None needed, causes TorpeDoS memory crash, patched May 2025. - CVE-2025-49716: NetLogon (RPC) - None needed, causes Stateless RPC DoS, patched July 2025. - CVE-2025-49722: Print Spooler (RPC) - Authenticated user needed, causes any Windows endpoint crash, patched July 2025. The vulnerabilities indicate significant architectural flaws in the LDAP client’s referral logic and RPC interfaces. SafeBreach advises administrators to apply patches promptly and limit DC exposure to the Internet. The emergence of Win-DDoS marks a shift in attack strategies, utilizing legitimate servers for amplification without leaving malware traces, complicating detection and response efforts. Enterprises are urged to enhance their threat models and implement DoS hardening measures.
AppWizard
August 11, 2025
A new free game, Summer in Mara, is being offered through Fanatical for 48 hours, expiring on August 13, contingent on stock availability. It is a cozy farming adventure developed by Chibig, originally released in 2020, and has received over 1,300 user reviews with a 76% approval rating. This is the first time the game has been available for free on Steam or any other platform. The game typically costs a certain amount and offers 20 to 30 hours of gameplay. Its compatibility with the Steam Deck is currently listed as “Unknown,” indicating potential performance variability. To access the free game, players must sign up for the Fanatical newsletter.
Winsage
August 11, 2025
During DEF CON 33, Yair and Shahak Morag from SafeBreach Labs introduced a new category of denial-of-service (DoS) attacks called the “Win-DoS Epidemic.” They identified four significant Windows DoS vulnerabilities, all categorized as “uncontrolled resource consumption,” including: - CVE-2025-26673 (CVSS 7.5): High-severity DoS vulnerability in Windows LDAP. - CVE-2025-32724 (CVSS 7.5): High-severity DoS vulnerability in Windows LSASS. - CVE-2025-49716 (CVSS 7.5): High-severity DoS vulnerability in Windows Netlogon. - CVE-2025-49722 (CVSS 5.7): Medium-severity DoS vulnerability in the Windows print spooler, requiring an authenticated attacker on an adjacent network. These vulnerabilities can incapacitate Windows endpoints and servers, including domain controllers (DCs), which are essential for managing authentication and resources in enterprise networks. The researchers also revealed a new DDoS attack method, termed Win-DDoS, which exploits a flaw in the Windows LDAP client referral process, allowing attackers to redirect DCs to a victim server and continuously repeat this redirection, creating a large-scale DDoS botnet using public DCs without leaving forensic traces.
Winsage
August 11, 2025
Researchers Yair and Shahak Morag from SafeBreach Labs introduced a new category of denial-of-service (DoS) attacks called the “Win-DoS Epidemic” at DEF CON 33. They identified four new vulnerabilities in Windows DoS and one zero-click distributed denial-of-service (DDoS) flaw, classified as “uncontrolled resource consumption.” The vulnerabilities include: - CVE-2025-26673 (CVSS 7.5): High-severity DoS vulnerability in Windows LDAP. - CVE-2025-32724 (CVSS 7.5): High-severity DoS vulnerability in Windows LSASS. - CVE-2025-49716 (CVSS 7.5): High-severity DoS vulnerability in Windows Netlogon. - CVE-2025-49722 (CVSS 5.7): Medium-severity DoS vulnerability in Windows Print Spooler, requiring an authenticated attacker on an adjacent network. These vulnerabilities can incapacitate Windows endpoints or servers, including Domain Controllers (DCs), potentially allowing for the creation of a DDoS botnet. The researchers also discovered a DDoS technique called Win-DDoS that exploits a flaw in the Windows LDAP client’s referral process, enabling attackers to redirect DCs to a victim server for continuous redirection. This method can leverage public DCs globally, creating a large, untraceable DDoS botnet without specialized infrastructure. Additionally, the researchers examined the Remote Procedure Call (RPC) protocol and found three new zero-click, unauthenticated DoS vulnerabilities that can crash any Windows system. They also identified another DoS flaw exploitable by any authenticated user on the network. The researchers released tools named “Win-DoS Epidemic” to exploit these vulnerabilities, highlighting the need for organizations to reassess their security measures regarding internal systems and services like DCs.
AppWizard
August 11, 2025
The "Hardcore update" for the survival game Rust reintroduces elements that increase gameplay intensity, including the fog of war on the map, requiring players to explore without a detailed layout. Players must craft a compass to mark their location, which only shows their position. Respawn cooldowns have increased to 15 minutes for sleeping bags and 10 minutes for beds, while base upkeep costs have doubled. Firearm crafting is completely banned in hardcore mode, with ammunition crafting costs significantly higher. The update also includes a redesigned game menu, optimized loading times (up to 65% faster), improved metal detector functionality, and visual upgrades. Additionally, the price of Rust has been halved from £35 to £17.50 to attract new players.
Tech Optimizer
August 8, 2025
Polymorphic malware is a type of malicious software that can change its code structure while maintaining its core functionality, making it difficult for traditional signature-based antivirus solutions to detect. It uses a mutation engine to create new variants by altering its code through techniques like code obfuscation, encryption, and junk code insertion. There are several categories of polymorphic malware, including polymorphic viruses, trojans, rootkits, and ransomware, each with unique characteristics. Detection of polymorphic malware is challenging due to its ability to evade conventional methods, prompting the use of behavioral analysis and machine learning for identification. To protect against such threats, a multi-layered security approach is recommended, including regular software updates, network segmentation, and employee training. Real-world examples like the Storm Worm and Conficker worm illustrate the significant impact of polymorphic malware, which has caused substantial financial losses. As cybersecurity measures advance, polymorphic malware continues to evolve, incorporating artificial intelligence and machine learning, leading to new challenges for security professionals. Cloud-based security solutions are emerging as effective tools to combat these threats.
AppWizard
August 8, 2025
The Epic Games Store is offering two free PC games until August 14. The first game is Road Redemption, an action racing game developed by Redemption Road and Pixel Dash Studios, published by Tripwire Presents, released in 2019, and typically retails for .99. It has an 82% approval rating from over 10,000 user reviews on Steam. The second game is 112 Operator, a simulation and strategy game developed by Jutsu Games and published by Games Operators, released in 2020, and normally costs .99. It has an 89% approval rating from over 5,000 user reviews on Steam.
Winsage
August 8, 2025
Microsoft will cease free support for Windows 10 in October 2025, ending security updates for users. Windows 11 requires specific hardware, including a 64-bit CPU, TPM 2.0, and Secure Boot, but can be installed on older devices using workarounds. The Rufus tool allows users to create a modified USB stick that bypasses these hardware checks. Users can download the Windows 11 ISO, integrate it into Rufus, and create a customized installation medium. The installation process can retain personal data and installed programs, but annual feature updates may require manual installation. UEFI mode and Secure Boot can be bypassed, but transitioning to UEFI is recommended. Upgrading hardware, such as adding RAM or installing an NVMe SSD, can improve performance on older systems.
Search