trusted applications

Winsage
June 6, 2025
Simplewall is a rule-based firewall controller for Windows that enhances the Windows Filtering Platform (WFP) without replacing it. It allows users to manage network access for applications and services with a user-friendly interface, supporting advanced features like filtering rules by IP, port, or protocol. Users can create tailored profiles for different scenarios and have comprehensive control over network interactions, including blocking telemetry data and automatic updates. Simplewall is lightweight, portable, and operates without background processes or telemetry, ensuring a straightforward user experience. Setting up simplewall involves downloading it, extracting the files, and enabling filters, allowing users to establish a functional firewall profile quickly. While it offers many advantages, such as being open-source and compatible with older Windows versions, it may be overwhelming for beginners and lacks detailed app profiling compared to premium firewalls.
Tech Optimizer
May 5, 2025
McAfee can appear on computers without user consent, often pre-installed on new laptops or bundled with other software. To uninstall McAfee on Windows 10 or 11, users can access the Settings app or Control Panel to remove it. For Mac users, the McAfee Total Protection Uninstaller can be used, but some residual files may need to be deleted manually. If standard uninstallation methods fail, the MCPR removal tool can be used to thoroughly clean up remnants of the software. Uninstalling McAfee is generally not detrimental, as many users prefer alternative antivirus solutions or rely on built-in protections provided by their operating systems.
Tech Optimizer
April 16, 2025
Windows Defender Application Control (WDAC) is a built-in security feature on Windows PCs that restricts the execution of unauthorized software by allowing only trusted applications. However, hackers have discovered multiple methods to bypass WDAC, exposing systems to malware and cyber threats. Techniques for bypassing WDAC include using Living-off-the-Land Binaries (LOLBins), DLL sideloading, and exploiting misconfigurations in WDAC policies. Attackers can execute unauthorized code without triggering alerts from traditional security solutions, enabling them to install ransomware or create backdoors. Microsoft operates a bug bounty program to address vulnerabilities in WDAC, but some bypass techniques remain unpatched for long periods. Users can mitigate risks by keeping Windows updated, being cautious with software downloads, and using strong antivirus software.
Winsage
March 18, 2025
Microsoft's Windows Defender Application Control (WDAC) has become a target for cybersecurity researchers, with bug bounty payouts for successful bypasses. IBM's X-Force team reported various outcomes from WDAC bypass submissions, including successful bypasses that lead to potential bounties, those added to the WDAC recommended block list, and submissions without recognition. Notable contributors like Jimmy Bayne and Casey Smith have made significant discoveries, while the LOLBAS Project has documented additional bypasses, including the Microsoft Teams application. The X-Force team successfully bypassed WDAC during Red Team Operations using techniques such as utilizing known LOLBINs, DLL side-loading, exploiting custom exclusion rules, and identifying new execution chains in trusted applications. Electron applications, which can execute JavaScript and interact with the operating system, present unique vulnerabilities, as demonstrated by a supply-chain attack on the MiMi chat application. In preparation for a Red Team operation, Bobby Cooke's team explored the legacy Microsoft Teams application, discovering vulnerabilities in signed Node modules that allowed them to execute shellcode without triggering WDAC restrictions. They developed a JavaScript-based C2 framework called Loki C2, designed to operate within WDAC policies and facilitate reconnaissance and payload deployment. A demonstration of Loki C2 showcased its ability to bypass strict WDAC policies by modifying resources of the legitimate Teams application, allowing undetected code execution. The ongoing development of techniques and tools by the X-Force team reflects the evolving cybersecurity landscape and the continuous adaptation required to counter emerging threats.
Winsage
December 4, 2024
Microsoft has launched the Windows Resiliency Initiative to enhance the security and reliability of its operating system in response to a significant CrowdStrike outage that affected over 8 million Windows PCs and servers, resulting in losses estimated at .4 billion. The initiative focuses on four key areas: learning from past incidents, reducing administrative privileges, implementing stronger controls for apps and drivers, and improving identity protection. Key components include: 1. Quick Machine Recovery: Allows IT administrators to remotely diagnose and repair devices, reducing downtime. 2. Administrative Protection: Users will operate under standard accounts by default to limit unauthorized access. 3. Smart App Control: Ensures only verified applications can run on Windows PCs. 4. Advanced Identity Protection: Enhancements include stronger password policies and multi-factor authentication. Additional improvements involve collaboration with security vendors, new encryption features, and transitioning components from C++ to Rust for better code security. The initiative aims to restore user confidence and prevent future cyber threats.
AppWizard
November 27, 2024
Security firm McAfee has identified 15 versions of predatory loan applications, known as 'SpyLoan', infiltrating the Google Play Store since 2020, with over 8 million installations. These apps request extensive permissions to harvest sensitive personal information, which is encrypted and sent to a command-and-control server. They mimic reputable financial services and often prompt users for a one-time password (OTP). Users have reported harassment from recovery agents, including threats and modified images taken from their devices. India is the most affected country, followed by Mexico, the Philippines, and others. Regulatory actions have been taken, but the apps continue to proliferate. Users are advised to check for and uninstall any SpyLoan apps to protect their personal information.
Search