Windows Defender Is Being Used to Hack Windows

A Windows zero-day called BlueHammer exploits Defender's own update process to give attackers full SYSTEM access. The exploit code is public and unpatched.

HackingPassion.com : [email protected][~]

🔮 New security advisory:

CVE-2026-40175 affects multiple systems.

‱ Impact: Remote code execution or complete system compromise possible
‱ Risk: Attackers can gain full control of affected systems
‱ Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-40175-axios-rce

#InfoSec #ZeroDay #ThreatIntel

CVE-2026-40175: Axios RCE - Patch Now

CVE-2026-40175 - Axios prior to 1.15.0 vulnerable to RCE via Prototype Pollution gadget chain (CVSS 10.0). Full cloud compromise possible. Get patch details.

Yazoul Security

《Angreifer nutzen derzeit eine Zero-Day-LĂŒcke in Adobe Reader aus. Bis es ein Sicherheitsupdate gibt, sollte man keine PDFs aus unbekannten Quellen öffnen.》

Warten auf Sicherheitsupdate: Angreifer attackieren #AdobeReader | Security https://www.heise.de/news/Warten-auf-Sicherheitsupdate-Angreifer-attackieren-Adobe-Reader-11251640.html #exploit #ZeroDay #0day

Warten auf Sicherheitsupdate: Angreifer attackieren Adobe Reader

Angreifer nutzen derzeit eine Zero-Day-LĂŒcke in Adobe Reader aus. Bis es ein Sicherheitsupdate gibt, sollte man keine PDFs aus unbekannten Quellen öffnen.

heise online

Anthropic's AI Model Exposes Enterprise Cybersecurity Readiness Gap

The unveiling of Anthropic's Claude Mythos Preview has sent a stark message to enterprise leaders: the cybersecurity tools they've relied on may no longer be enough to protect their networks from zero-day flaws that even humans miss. This frontier AI model has the potential to expose a gaping hole in their


https://osintsights.com/anthropics-ai-model-exposes-enterprise-cybersecurity-readiness-gap?utm_source=mastodon&utm_medium=social

#ZeroDay #ArtificialIntelligence #EnterpriseSecurity #CybersecurityReadiness #FrontierModels

Anthropic's AI Model Exposes Enterprise Cybersecurity Readiness Gap

Discover the enterprise cybersecurity readiness gap exposed by Anthropic's AI model and learn how to strengthen your defenses now with expert insights and strategies.

OSINTSights
🎹 Hackear es un arte y defender es una ciencia. Domina ambos con el Curso de OWASP Top 10 🔬 SĂĄbados 18 y 25 de abril 2026. De 9 am a 12 pm. (UTC -05:00) đŸ“Č WhatsApp: https://wa.me/51949304030 đŸ€– https://www.reydes.com/archivos/cursos/Curso_OWASP_Top_10.pdf #zeroday #ddos #databreach #cyberattack #cyberaware #cybersecurityawareness #owasp

🚹 New security advisory:

CVE-2026-1115 affects multiple systems.

‱ Impact: Remote code execution or complete system compromise possible
‱ Risk: Attackers can gain full control of affected systems
‱ Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-1115-parisneo-lollms-stored-xss

#InfoSec #ZeroDay #ThreatIntel

CVE-2026-1115: parisneo/lollms Stored XSS - Patch Now

CVE-2026-1115 - A critical stored XSS vulnerability in parisneo/lollms social feature (versions < 2.2.0). Enables account takeover via malicious posts. Patch now to secure your instance.

Yazoul Security

Tech Giants Unveil AI-Powered Bid to Fix Open Source Flaws

Tech giants have launched a game-changing $100 million initiative, Project Glasswing, harnessing AI to uncover and fix hidden flaws in critical open source software, aiming to bolster security and prevent devastating exploits. Led by Anthropic, this coalition is proactively tackling vulnerabilities with a cutting-edge AI program


https://osintsights.com/tech-giants-unveil-ai-powered-bid-to-fix-open-source-flaws?utm_source=mastodon&utm_medium=social

#OpenSourceSoftware #AiPowered #ZeroDay #VulnerabilityManagement #EmergingThreats

Tech Giants Unveil AI-Powered Bid to Fix Open Source Flaws

Discover how tech giants tackle open source flaws with AI-powered Project Glasswing, investing $100 million to secure critical software now and learn more.

OSINTSights

🚹 New security advisory:

CVE-2026-34424 affects multiple systems.

‱ Impact: Remote code execution or complete system compromise possible
‱ Risk: Attackers can gain full control of affected systems
‱ Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-34424-smart-slider-3-pro-rce

#InfoSec #ZeroDay #ThreatIntel

CVE-2026-34424: Smart Slider 3 Pro RCE - Patch Now

CVE-2026-34424 - Smart Slider 3 Pro 3.5.1.35 for WordPress/Joomla allows unauthenticated RCE via a compromised update (CVSS 9.8). Patch immediately to remove backdoors. Get patch details.

Yazoul Security

Windows-Zero-Day „BlueHammer“: Defender-Updateprozess als Einfallstor fĂŒr Rechteausweitung

Ein unter dem Pseudonym „Chaotic Eclipse“ auftretender Sicherheitsforscher hat Anfang April 2026 einen funktionsfĂ€higen Exploit fĂŒr eine ungepatchte Windows-Schwachstelle veröffentlicht – ohne Absprache mit Microsoft, ohne CVE-Nummer.

https://www.all-about-security.de/windows-zero-day-bluehammer-defender-updateprozess-als-einfallstor-fuer-rechteausweitung/

#windows #windowsdefender #exploit #zeroday

Windows-Zero-Day „BlueHammer": Defender-Updateprozess als Einfallstor fĂŒr Rechteausweitung

Windows-Zero-Day BlueHammer nutzt Defender-Updates und VSS, um lokale Rechte auf SYSTEM zu eskalieren – ungepacht, öffentlich, funktionsfĂ€hig.

All About Security Das Online-Magazin zu Cybersecurity (Cybersicherheit). Ransomware, Phishing, IT-Sicherheit, Netzwerksicherheit, KI, Threats, DDoS, Identity & Access, Plattformsicherheit
FĂąchĂ© contre #Microsoft, ce chercheur publie l’ #exploit d’une faille #zeroday #Windows sur #GitHub. Un chercheur en #sĂ©curitĂ© a mis en ligne le code d’exploitation de BlueHammer, une #faille d’élĂ©vation de privilĂšges locale signalĂ©e Ă  Microsoft mais toujours non corrigĂ©e. Le PoC n’est pas parfaitement stable, mais plusieurs spĂ©cialistes ont confirmĂ© qu’il fonctionnait
https://www.clubic.com/actualite-608326-fache-contre-microsoft-ce-chercheur-publie-l-exploit-d-une-faille-zero-day-windows-sur-github.html
Pourquoi utilisez-vous encore les produits Microsoft alors qu'il existe des alternatives libres ?
FĂąchĂ© contre Microsoft, ce chercheur publie l’exploit d’une faille zero-day Windows sur GitHub

Un chercheur en sĂ©curitĂ© a mis en ligne le code d’exploitation de BlueHammer, une faille d’élĂ©vation de privilĂšges locale signalĂ©e Ă  Microsoft mais toujours non corrigĂ©e. Le PoC n’est pas parfaitement stable, mais plusieurs spĂ©cialistes ont confirmĂ© qu’il fonctionnait.

clubic.com