Security News

Microsoft has addressed the last remaining known issues affecting Windows 10 computers with Conexant or Synaptics devices causing errors and problems when updating to Windows 10 versions 2004 or 20H2. These issues impacting computers with Conexant ISST audio drivers and those with Conexant or Synaptics audio devices have been under investigation since May 2020, when the first version of Windows 10 2004 was released. Devices affected by Conexant issues can now upgrade to the latest released Windows 10 and Windows Server versions after Microsoft has removed the remaining safeguard holds, blocking them from updating.

Microsoft has reportedly paused the development of Windows 10X, its Chrome OS competitor for single-screen and dual-screen devices. Unlike Windows 10, Windows 10X was supposed to be simple, sleek, faster, and more secure.

Microsoft has released Windows 10 Insider Build 21376 with a preview of a new default font for Windows 10 called 'Segoe UI Variable. For years, the default font family used in Microsoft branding and marketing materials has been Segoe, with the Segoe UI font sub-family used by the Windows operating system and other applications created by Microsoft.

As reported by WindowsLatest, in the recent Windows 10 Insider 'Dev' builds, Microsoft has revamped many of these icons as part of their Sun Valley design refresh, expected to be released in Fall 2021. Dll icons from both Windows 10 20H2 and the latest Windows 10 Insider 'Dev' build.

An unknown threat actor used a new stealthy rootkit to backdoor targeted Windows systems what looks like an ongoing espionage campaign dubbed TunnelSnake going back to at least 2018. Rootkits are malicious tools designed to evade detection by burying deep into the operating system and used by attackers to fully take over infected systems while avoiding detection.

Version 90 of Google's Chrome browser includes a bit of extra security for users of recent versions of Windows and the latest x86 processors, in the form of hardware-enforced stack protection. This basically means that, if your PC supports it, it's a bit harder for malicious websites to exploit bugs in Chrome to hijack your computer.

A Windows Defender bug creates thousands of small files that waste gigabytes of storage space on Windows 10 hard drives. The bug started with Windows Defender antivirus engine 1.1.18100.

Starting in version 90, Chrome for Windows improves resilience against vulnerability exploitation by adopting Hardware-enforced Stack Protection. Together with existing protection measures, the Stack Protection should mitigate a variety of exploitation techniques, but could affect stability if it is not compatible with software that loads itself into Chrome.

Google Chrome now hinders attackers' efforts to exploit security bugs on systems with Intel 11th Gen or AMD Zen 3 CPUs, running Windows 10 2004 or later. This is possible after the adoption of Intel's Control-flow Enforcement Technology, supported on Windows 10 computers through an implementation known as Hardware-enforced Stack Protection which adds enhanced exploit protection to all compatible devices.

Dubbed "Pingback," this malware targets Microsoft Windows 64-bit systems, and uses DLL Hijacking to gain persistence. Abuses real Windows service to load malicious DLL. Today, Trustwave senior architect Lloyd Macrohon and principal security researcher Rodel Mendrez, have released their findings on a novel Windows malware that exists as a 64-bit DLL. Of note is the malware sample's choice of the communication protocol being ICMP, which is also used by the popular ping command and the Windows traceroute utility.