A researcher discovered five different exploit paths that stem from an architectural weakness in Windows' Remote Procedure ...
RedSun exploit targets Microsoft Defender zero-day, granting SYSTEM access on fully patched Windows systems with no patch ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
Three proof-of-concept exploits are being used in active attacks against Microsoft's built-in security platform; two are ...
A researcher known as "Chaotic Eclipse" has published a proof-of-concept exploit for a second Microsoft Defender zero-day, ...
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or ...
Although the team with Microsoft moved swiftly to patch the BlueHammer vulnerability, other exploits still threaten Microsoft ...
New PoC shows how Microsoft Defender can be tricked into rewriting malicious files into protected locations, enabling ...
The exploit uses an insecure behavior of Windows Defender and a file API to secure system rights. It is still unpatched.
A security researcher published details of three security vulnerabilities in Windows Defender, and the code used to exploit ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.” ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results