cybersecurity vulnerabilities

Winsage
March 7, 2025
Concerns are rising about cybersecurity vulnerabilities in the NHS as it transitions to Windows 11, especially since Microsoft will stop security updates for Windows 10 on October 14, 2025. Many NHS institutions are facing hardware limitations that may hinder this upgrade. The NHS's device configuration has shifted from approximately 70% desktop PCs and 30% laptops to an estimated 80% laptops, many of which are now five years old due to the pandemic-related distribution surge. This aging technology poses significant risks, as the NHS capital budget has not increased to address the need for updates. A spokesperson for NHS England confirmed a five-year deal with Microsoft for security solutions, urging organizations to transition to Windows 11 before the end of Windows 10 support. Additionally, a 2022 British Medical Association report indicated that over 13.5 million hours of doctors' time were lost annually due to inadequate IT systems, with 80% of doctors believing that improved IT infrastructure would help address backlogs.
Winsage
August 21, 2024
Microsoft plans to roll out its Recall artificial intelligence search feature for Windows users, with testing starting in October. Recall allows users to search for previously viewed information through screenshots captured during their activity. The feature will be disabled by default to address security concerns regarding automatic image capturing without user consent. Recall will be available on devices that meet the requirements for Copilot+ PCs, which are designed to handle AI workloads locally. Microsoft has not specified a timeline for a broader release but aims for availability by the holiday season. The company is focusing on security, incorporating cybersecurity contributions into employee performance evaluations, and has emphasized that security remains a top priority.
Winsage
August 6, 2024
Elastic Security Labs has identified techniques that malicious actors may use to bypass Windows security alerts, particularly targeting Windows SmartScreen and Smart App Control (SAC). One method, known as "LNK Stomping," exploits a flaw in how Windows handles shortcut files (.LNK) to nullify the Mark of the Web (MotW) tag, which indicates potentially dangerous files. This technique allows malware to evade detection since SmartScreen only scans files with the MotW tag. The technique involves creating LNK files with unconventional target paths, prompting Windows Explorer to correct these discrepancies and remove the MotW tag. Desimone noted that this vulnerability has been present for over six years, with samples found in VirusTotal. Other methods to bypass reputation-based protections include signing malicious applications with code-signing certificates, Reputation Hijacking, Reputation Seeding, and Reputation Tampering. These methods manipulate legitimate programs or create seemingly trustworthy binaries to exploit vulnerabilities in the system.
Search