Agregátor RSS
When LKML Patches Signal Exploitation Risk Before CVE Assignment
Vybíráme nejlepší fotomobily současnosti. Tohle si kupte místo foťáku
Příběhy Kingdom Come rozšíří povídková kniha. Vrátí se Michal a David, dojde i na nové postavy
Google expands Gemini AI use to fight malicious ads on its platform
Americans who masterminded Nork IT worker fraud sentenced to 200 months behind bars
Two Americans have been jailed for a combined 200 months for helping North Korea generate $5 million through fraudulent IT worker schemes.…
Gemini opustilo prohlížeč a je rovnou na ploše. Google na Macy vpustil AI
New ATHR vishing platform uses AI voice agents for automated attacks
Most "AI SOCs" Are Just Faster Triage. That's Not Enough.
Nová CAPTCHA na katastru nemovitostí
Lego leze do peněz. Tady je 15 nejdražších setů, které jsou aktuálně v prodeji. Začínáme nad 11 tisíci
Rust 1.95.0
Thunderbolt, open-source AI klient od Mozilly
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
Git identity spoof fools Claude into giving bad code the nod
Security boffins say Anthropic's Claude can be tricked into approving malicious code with just two Git commands by spoofing a trusted developer's identity.…
4K projektor za hubičku. Kvalitní Optoma Photo Life PK31 zlevnil na 11 tisíc
Microsoft’s Windows Recall still allows silent data extraction
Microsoft’s Windows Recall feature remains vulnerable to complete data extraction despite a major security overhaul, according to a cybersecurity researcher who says malware running in a user’s context can quietly siphon off everything Recall has captured, without administrator privileges, kernel exploits, or breaking encryption.
Alexander Hagenah, executive director at Zürich-based financial infrastructure operator SIX Group, made the claim in a LinkedIn post, where he also published a proof-of-concept tool called TotalRecall Reloaded to demonstrate the issue.
Hagenah first exposed Recall’s security flaws in 2024, forcing Microsoft to pull the feature from preview and rebuild it. Microsoft relaunched Recall in April 2025, saying the new architecture would restrict “attempts by latent malware trying to ‘ride along’ with a user authentication to steal data.” Hagenah said it does not.
“When you use Recall normally, TotalRecall Reloaded silently holds the door open behind you and then extracts what Recall has ever captured. That is precisely the scenario Microsoft’s architecture is supposed to restrict,” he wrote in the post.
Hagenah wrote in the post that he disclosed the research to Microsoft’s Security Response Center on March 6, submitting full source code and reproduction steps. Microsoft reviewed the case for a month and closed it on April 3, telling him the behavior “does not represent a bypass of a security boundary or unauthorized access to data.”
“Microsoft says this is by design,” Hagenah wrote. “That worries me.”
In an email response to CSO, a Microsoft spokesperson said, “After careful investigation, we determined that the access patterns demonstrated are consistent with intended protections and existing controls, and do not represent a bypass of a security boundary or unauthorized access to data. The authorization period has a timeout and anti-hammering protection that limit the impact of malicious queries.”
Hagenah’s research does not challenge Microsoft’s encryption, which he said is sound. The gap, he told CSO, is in how decrypted data is handled once it leaves the enclave.
“Plaintext screenshots and extracted text end up in an unprotected process for display,” he told CSO. “As long as decrypted content crosses into a process that same-user code can access, someone will find a way in.”
What a fix would requireA fix is technically feasible, Hagenah said.
“The short-term fix is fairly straightforward. Microsoft could add stronger code integrity and process protections to AIXHost.exe, the process that renders the Recall timeline. Right now, it has none, which makes the injection path possible. That would block the specific technique I demonstrated and materially raise the bar,” he said.
The longer-term problem runs deeper, he said. “Microsoft should rethink how decrypted data is handled after it leaves the enclave. The cryptography and enclave design are genuinely well done, and I want to be clear about that. The problem is that plaintext screenshots and extracted text end up in an unprotected process for display. As long as decrypted content crosses into a process that same-user code can access, someone will find a way in,” he said.
“A durable fix would mean either rendering inside a protected process or adopting a compositing model where raw data never leaves the trust boundary. That is a bigger effort, but it is the only way to close this class of issue properly,” he said.
Exploitation riskThe barrier to weaponizing this technique is lower than Microsoft’s security messaging would suggest, Hagenah said.
“They only need code running in the user’s context and a way to reuse the authorized Recall session,” he said. “That is a much lower bar than many people would assume from Microsoft’s security messaging.”
While Recall’s limitation to Copilot+ PCs and its opt-in status reduce the scale of exposure, targeted abuse is a realistic near-term risk, he said. “For targeted abuse, surveillance, or high-value user collection, this is absolutely realistic,” he said.
Hagenah said he published the source code deliberately so defenders, EDR vendors, and security teams could build detections before threat actors operationalize the technique independently. “In my view, that gives the defensive side a valuable head start,” he said.
Independent security researcher Kevin Beaumont reached a similar conclusion after separately testing the current Recall implementation. “Yep, you can just read the database as a user process,” Beaumont wrote on Mastodon on March 11. “The database also contains all manner of fields that aren’t publicly disclosed for tracking the user’s activity. No AV or EDR alerts triggered,” he wrote.
The article originally appeared in CSO.
Cal.com kvůli hrozbě AI uzavírá zdrojový kód
Cisco says critical Webex Services flaw requires customer action
KDE Gear 26.04
Textbook titan McGraw Hill on ransomware crew's reading list after 13.5M records exposed
Textbook giant McGraw Hill has landed on a ransomware crew's leak site after an alleged Salesforce-linked misconfiguration spilled 13.5 million records into the wild.…
- « první
- ‹ předchozí
- …
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- …
- následující ›
- poslední »



