360 Total Security Blog » Languages » English - RSS Feed

Download 360 Total Security for Windows. Protect and optimize your computer with award-winning antivirus. Speed up, clean up and secure your PC. All for free.

Latest articles

Urgent! Minecraft players are under massive attack

Overview On the evening of December 9, 2021, the exploitation details of a remote code execution vulnerability in the open source project Apache Log4j 2 were made public. The incident quickly fermented and swept through most of the Internet. As Log4j is a common basic component of java logging and is widely used, the disaster area is also expanding...

Urgent|Apache log4j-2.15.0-rc1 version has a bypass risk, please upgrade to log4j-2.15.0-rc2 as soon as possible!

On December 9, 360 Security Center monitored that Apache officially released the log4j-2.15.0-rc1 version on December 7, 2021. According to the research and judgment of 360 Group’s security experts, this version has bypass risks and security risks. The manufacturer has released the latest version log4j-2.15.0-rc2, please update as soon as possible....

No patch available for the Microsoft Windows MSHTML remote code execution vulnerability, 360 Total Security takes the lead to intercept it!

No patch available for the Microsoft Windows MSHTML remote code execution vulnerability, 360 Total Security takes the lead to intercept it! Recently, 360 Security Center monitored that Microsoft officially released an emergency notice about MSHTML components, the vulnerability number is CVE-2021-40444, and the vulnerability level: high risk. An attacker...

“Netfilter Rootkit II ” Continues to Hold WHQL Signatures

1.Backgroud Recently, 360 Security Center discovered that a malicious driver “Netfilter rootkit” with WHQL signature was revealed in mid-June. WHQL signature means that after the hardware driver passed the Microsoft certification, Microsoft will add a “Hardware Compatibility Publisher” digital signature to the driver. The Netfilter rootkit has now...

360 Total Security has supported the defense against PrintNightmare vulnerabilities

On June 30, a security officer released a proof of concept for a Windows printer remote code execution vulnerability and named the vulnerability “PrintNightmare”. It is reported that this vulnerability can allow low-privileged users to launch attacks on computers in the local network, thereby controlling vulnerable computers, while ordinary users in...

Spooler Exposes New Vulnerabilities, 360 Total Security Support Defense Immediately

In the security update in June this year, Microsoft fixed a long-standing Windows Print Spooler remote command execution vulnerability, the vulnerability number is CVE-2021-1675. By exploiting this vulnerability, an attacker can use a low-privileged user to launch an attack on a computer in the local network and control the vulnerable computer. Especially...

Spooler Exposes New Vulnerabilities, 360 Total Security Support Defense Immediately

In the security update in June this year, Microsoft fixed a long-standing Windows Print Spooler remote command execution vulnerability, the vulnerability number is CVE-2021-1675. By exploiting this vulnerability, an attacker can use a low-privileged user to launch an attack on a computer in the local network and control the vulnerable computer. Especially...

DarkSide’s Targeted Ransomware Analysis Report for Critical U.S. Infrastructure

DarkSide Group Background DarkSide is an emerging RaaS (ransomware as a service) criminal group. The group may be organized by other former branches of ransomware activities. According to the attack rules announced by the group, the group only target The medical, government, education, non-profit organizations, and organizations outside the funeral...

Be Careful Of FakeTelegram

In March 2021, 360 Security Center discovered an attack that disguised Telegram installation package. After the “installation package” is executed, the legitimate Telegram installation package will be downloaded for installation to cover up the malicious behavior in secret, and reside through the RDP service. The attack flow chart is as follows: ...

A “txt file” can steal all your secrets

Recently, 360 Security Center’s threat monitoring platform has detected an email phishing attack. This attack uses a secret-stealing Trojan called Poulight. The Poulight Trojan has been put into use since last year and has complete and powerful functions. This attack proved that it has begun to spread and use overseas. Attack process analysis The...

Discover, share and read the best on the web

Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!