<?xml version="1.0"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:neowin="https://www.neowin.net/">
	<channel>
		<title>Neowin News Feed for: Exploit</title>
		<link>https://www.neowin.net/news/tag/exploit/</link>
        <atom:link href="https://www.neowin.net/news/rss/exploit/" rel="self" type="application/rss+xml" />
		<description>Neowin News Feed for: Exploit</description>
		<language>en-us</language>
		<generator>Neowin Ignition News</generator>
		<managingEditor>editor@neowin.net (Managing Editor)</managingEditor>
		<webMaster>developers@neowin.net (Neowin Developers)</webMaster>
		<ttl>5</ttl>
		<image>
			<title>Neowin.net</title>
			<url>https://www.neowin.net/images/pegasus/icon.png</url>
			<link>https://www.neowin.net</link>
		</image>
		        <item>
            <title>Hackers are selling a Windows exploit for $220,000 on the dark web</title>
            <link>https://www.neowin.net/news/hackers-are-selling-a-windows-exploit-for-220000-on-the-dark-web/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2026/03/1773091564_hacker_windows_exploit_vulnerability_medium.webp" alt="" /&gt;&lt;/div&gt;A Windows exploit that grants system-level access to attackers is currently up for sale on the dark web for $220,000. &lt;a href="https://www.neowin.net/news/hackers-are-selling-a-windows-exploit-for-220000-on-the-dark-web/"&gt;Read more...&lt;/a&gt;</description>
            <author>Ivan Jenic</author>
            <pubDate>Tue, 10 Mar 2026 01:32:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/hackers-are-selling-a-windows-exploit-for-220000-on-the-dark-web/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2026/03/1773091564_hacker_windows_exploit_vulnerability_story.webp" width="760" height="428" />
            <neowin:tags>#WindowsExploit #DarkWeb</neowin:tags>            <neowin:twitter>@ivan_jenic</neowin:twitter>        </item>
                <item>
            <title>Microsoft rolls out August 2025 security patches for Exchange Server</title>
            <link>https://www.neowin.net/news/microsoft-rolls-out-august-2025-security-patches-for-exchange-server/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2025/08/1755024379_1280x720-ghost-white-solid-color-background-fotor-20250812234553_medium.webp" alt="" /&gt;&lt;/div&gt;Microsoft has released August 2025 Security Updates (SUs) for Exchange Server deployments, containing fixes for the recent, high-severity CVE-2025-53786 flaw. &lt;a href="https://www.neowin.net/news/microsoft-rolls-out-august-2025-security-patches-for-exchange-server/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Tue, 12 Aug 2025 19:10:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-rolls-out-august-2025-security-patches-for-exchange-server/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2025/08/1755024379_1280x720-ghost-white-solid-color-background-fotor-20250812234553_story.webp" width="760" height="428" />
            <neowin:tags>#Microsoft #ExchangeServer</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google Project Zero exposes security flaw in libxslt library used in GNOME applications</title>
            <link>https://www.neowin.net/news/google-project-zero-exposes-security-flaw-in-libxslt-library-used-in-gnome-applications/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2025/07/1751908525_gnome_medium.webp" alt="" /&gt;&lt;/div&gt;Google&amp;#039;s Project Zero team has publicly disclosed a UAF flaw in the popular libxslt library following GNOME&amp;#039;s inability to fix it within 90 days of private reporting. &lt;a href="https://www.neowin.net/news/google-project-zero-exposes-security-flaw-in-libxslt-library-used-in-gnome-applications/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Tue, 05 Aug 2025 13:36:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-project-zero-exposes-security-flaw-in-libxslt-library-used-in-gnome-applications/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2025/07/1751908525_gnome_story.webp" width="760" height="428" />
            <neowin:tags>#GoogleProjectZero #GNOME #KDE</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft takes legal action against bad actors using AI for sophisticated exploitation</title>
            <link>https://www.neowin.net/news/microsoft-takes-legal-action-against-bad-actors-using-ai-for-sophisticated-exploitation/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2024/05/1714739776_1714075556002_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has obtained a court order to seize a website as part of legal action against malicious actors leveraging AI tools to hack online accounts. &lt;a href="https://www.neowin.net/news/microsoft-takes-legal-action-against-bad-actors-using-ai-for-sophisticated-exploitation/"&gt;Read more...&lt;/a&gt;</description>
            <author>Paul Hill</author>
            <pubDate>Sat, 11 Jan 2025 08:32:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-takes-legal-action-against-bad-actors-using-ai-for-sophisticated-exploitation/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2024/05/1714739776_1714075556002_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #AI</neowin:tags>            <neowin:twitter>@ziks_99</neowin:twitter>        </item>
                <item>
            <title>Three million Saflok locks can be opened by crooks due to 36-year-old security holes</title>
            <link>https://www.neowin.net/news/three-million-saflok-locks-can-be-opened-by-crooks-due-to-36-year-old-security-holes/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2024/03/1711146092_unsaflok_ico_medium.jpg" alt="" /&gt;&lt;/div&gt;Common electronic locks used in hotels still suffer from vulnerabilities reported to the manufacturer in 2022. It allows the hackers to forge universal keycards that can open any door. &lt;a href="https://www.neowin.net/news/three-million-saflok-locks-can-be-opened-by-crooks-due-to-36-year-old-security-holes/"&gt;Read more...&lt;/a&gt;</description>
            <author>Martin Hodás</author>
            <pubDate>Sat, 23 Mar 2024 00:00:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/three-million-saflok-locks-can-be-opened-by-crooks-due-to-36-year-old-security-holes/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2024/03/1711146092_unsaflok_ico_story.jpg" width="760" height="428" />
            <neowin:tags>#Dormakaba #Saflok #Exploit</neowin:tags>            <neowin:twitter>@Hody_MH11</neowin:twitter>        </item>
                <item>
            <title>New malware bypassing Windows SmartScreen is hungry for your data, and it wants it all</title>
            <link>https://www.neowin.net/news/new-malware-bypassing-windows-smartscreen-is-hungry-for-your-data-and-it-wants-it-all/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/06/1654151911_windows_vulnerability_medium.jpg" alt="" /&gt;&lt;/div&gt;Data-harvesting malware Phemedrone exploits vulnerability in Windows Defender SmartScreen to avoid warnings and checks. It collects various sensitive data and sends them to the hackers. &lt;a href="https://www.neowin.net/news/new-malware-bypassing-windows-smartscreen-is-hungry-for-your-data-and-it-wants-it-all/"&gt;Read more...&lt;/a&gt;</description>
            <author>Martin Hodás</author>
            <pubDate>Tue, 16 Jan 2024 15:30:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/new-malware-bypassing-windows-smartscreen-is-hungry-for-your-data-and-it-wants-it-all/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/06/1654151911_windows_vulnerability_story.jpg" width="760" height="428" />
            <neowin:tags>#Phemedrone #Malware #Windows</neowin:tags>            <neowin:twitter>@Hody_MH11</neowin:twitter>        </item>
                <item>
            <title>ChatGPT was tricked into generating valid activation keys for Windows 95</title>
            <link>https://www.neowin.net/news/chatgpt-was-tricked-into-generating-valid-activation-keys-for-windows-95/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2023/04/1680538017_chatgpt_windows_xp_medium.jpg" alt="" /&gt;&lt;/div&gt;OpenAI&amp;#039;s ChatGPT was successfully tricked into generating valid activation keys for Windows 95. Although it refused at first, a revised prompt was able to trick the AI without the chatbot realizing. &lt;a href="https://www.neowin.net/news/chatgpt-was-tricked-into-generating-valid-activation-keys-for-windows-95/"&gt;Read more...&lt;/a&gt;</description>
            <author>Sayan Sen</author>
            <pubDate>Mon, 03 Apr 2023 17:30:02 +0000</pubDate>
            <guid>https://www.neowin.net/news/chatgpt-was-tricked-into-generating-valid-activation-keys-for-windows-95/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2023/04/1680538017_chatgpt_windows_xp_story.jpg" width="760" height="428" />
            <neowin:tags>#ChatGPT #Windows95 #Microsoft</neowin:tags>            <neowin:twitter>@ssc_combater007</neowin:twitter>        </item>
                <item>
            <title>Use this Python utility developed by CISA to detect hacking in Microsoft cloud environments</title>
            <link>https://www.neowin.net/news/use-this-python-utility-developed-by-cisa-to-detect-hacking-in-microsoft-cloud-environments/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2021/02/1614322146_pexels-kevin-ku-577585_medium.jpg" alt="" /&gt;&lt;/div&gt;U.S. federal cybersecurity agency CISA has developed a Python-based utility to detect signs of hacking in Microsoft cloud environments including Microsoft 365, Azure, and Azure Active Directory (AAD). &lt;a href="https://www.neowin.net/news/use-this-python-utility-developed-by-cisa-to-detect-hacking-in-microsoft-cloud-environments/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Fri, 24 Mar 2023 09:56:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/use-this-python-utility-developed-by-cisa-to-detect-hacking-in-microsoft-cloud-environments/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2021/02/1614322146_pexels-kevin-ku-577585_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #CISA #Hacking</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Meet SH1mmer, the big bad Chromebook exploit no one is talking about</title>
            <link>https://www.neowin.net/news/meet-sh1mmer-the-big-bad-chromebook-exploit-no-one-is-talking-about/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2023/01/1675105055_sh1mmer-hear_medium.jpg" alt="" /&gt;&lt;/div&gt;SH1MMER, a dangerous new ChromeOS exploit that was released on Friday the 13th, has flown under the radar for two weeks, and there&amp;#039;s nothing stopping you from having a little fun with it. &lt;a href="https://www.neowin.net/news/meet-sh1mmer-the-big-bad-chromebook-exploit-no-one-is-talking-about/"&gt;Read more...&lt;/a&gt;</description>
            <author>Dean Howell</author>
            <pubDate>Mon, 30 Jan 2023 19:19:09 +0000</pubDate>
            <guid>https://www.neowin.net/news/meet-sh1mmer-the-big-bad-chromebook-exploit-no-one-is-talking-about/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2023/01/1675105055_sh1mmer-hear_story.jpg" width="760" height="428" />
            <neowin:tags>#SH1MMER #ChromeOS #Chromebook</neowin:tags>                    </item>
                <item>
            <title>The PlayStation 5 has been jailbroken but the exploit is quite limited</title>
            <link>https://www.neowin.net/news/the-playstation-5-has-been-jailbroken-but-the-exploit-is-quite-limited/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/03/1648035228_ps5_medium.jpg" alt="" /&gt;&lt;/div&gt;Modders have managed to jailbreak the PlayStation 5 using a WebKit exploit in an old PS5 firmware. The exploit is quite limited at this point, but work will likely continue to make it more useful. &lt;a href="https://www.neowin.net/news/the-playstation-5-has-been-jailbroken-but-the-exploit-is-quite-limited/"&gt;Read more...&lt;/a&gt;</description>
            <author>Paul Hill</author>
            <pubDate>Mon, 03 Oct 2022 16:22:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/the-playstation-5-has-been-jailbroken-but-the-exploit-is-quite-limited/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/03/1648035228_ps5_story.jpg" width="760" height="428" />
            <neowin:tags>#PlayStation5 #Jailbreak</neowin:tags>            <neowin:twitter>@ziks_99</neowin:twitter>        </item>
                <item>
            <title>Microsoft Weekly: Printer nightmares, Teams capabilities, and the death of SwiftKey for iOS</title>
            <link>https://www.neowin.net/news/microsoft-weekly-printer-nightmares-teams-capabilities-and-the-death-of-swiftkey-for-ios/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/10/1664643140_10790277_(34)_(1)_medium.jpg" alt="" /&gt;&lt;/div&gt;This edition of Microsoft Weekly recaps a bunch of Windows 11 2022 Update issues, new features introduced to the Dev Channel, recent capabilities added to Teams, and the death of SwiftKey for iOS. &lt;a href="https://www.neowin.net/news/microsoft-weekly-printer-nightmares-teams-capabilities-and-the-death-of-swiftkey-for-ios/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Sat, 01 Oct 2022 17:16:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-weekly-printer-nightmares-teams-capabilities-and-the-death-of-swiftkey-for-ios/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/10/1664643140_10790277_(34)_(1)_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #MicrosoftWeekly</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google announces new Vulnerability Reward Program specifically for open source software</title>
            <link>https://www.neowin.net/news/google-announces-new-vulnerability-reward-program-specifically-for-open-source-software/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/04/1651218816_v6duco_(2)_medium.jpg" alt="" /&gt;&lt;/div&gt;Google has revealed an expansion to its Vulnerability Reward Program (VRP). It is designed to encourage privately reporting security flaws in open source software in exchange for monetary rewards. &lt;a href="https://www.neowin.net/news/google-announces-new-vulnerability-reward-program-specifically-for-open-source-software/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Tue, 30 Aug 2022 11:00:02 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-announces-new-vulnerability-reward-program-specifically-for-open-source-software/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/04/1651218816_v6duco_(2)_story.jpg" width="760" height="428" />
            <neowin:tags>#Google #OSS #Security</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Janet Jackson song is now an official exploit for Windows PCs</title>
            <link>https://www.neowin.net/news/janet-jackson-song-is-now-an-official-exploit-for-windows-pcs/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/08/1660829511_windows-xp_medium.jpg" alt="" /&gt;&lt;/div&gt;The MITRE Corporation has officially declared that Janet Jackson&amp;#039;s music video of Rhythm Nation is an exploit. It has assigned it a CVE ID nearly two decades after its initial discovery. &lt;a href="https://www.neowin.net/news/janet-jackson-song-is-now-an-official-exploit-for-windows-pcs/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Thu, 18 Aug 2022 13:36:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/janet-jackson-song-is-now-an-official-exploit-for-windows-pcs/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/08/1660829511_windows-xp_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #WindowsXP</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Following Chrome, Edge gets emergency update for high severity 0-day exploit too</title>
            <link>https://www.neowin.net/news/following-chrome-edge-gets-emergency-update-for-high-severity-0-day-exploit-too/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/03/1648384636_1155041_medium.jpg" alt="" /&gt;&lt;/div&gt;Following in the footsteps of Chrome, Edge has received an update to fix a rather severe 0-day exploit too. This is because the issue affects all browsers based on Chromium, including Edge. &lt;a href="https://www.neowin.net/news/following-chrome-edge-gets-emergency-update-for-high-severity-0-day-exploit-too/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Thu, 07 Jul 2022 06:54:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/following-chrome-edge-gets-emergency-update-for-high-severity-0-day-exploit-too/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/03/1648384636_1155041_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #Edge #Chromium</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google Chrome receives emergency security update for 0-day exploit</title>
            <link>https://www.neowin.net/news/google-chrome-receives-emergency-security-update-for-0-day-exploit/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/07/1657002437_gjevgn_(24)_medium.jpg" alt="" /&gt;&lt;/div&gt;Google has rolled out security updates for Chrome across various channels to fix a handful of issues, including one 0-day exploit. Details of the problem are private for now but it has high severity. &lt;a href="https://www.neowin.net/news/google-chrome-receives-emergency-security-update-for-0-day-exploit/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Tue, 05 Jul 2022 06:40:02 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-chrome-receives-emergency-security-update-for-0-day-exploit/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/07/1657002437_gjevgn_(24)_story.jpg" width="760" height="428" />
            <neowin:tags>#GoogleChrome #0Day</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft Weekly: Edge on the rise, exploits, and a Windows 11 build</title>
            <link>https://www.neowin.net/news/microsoft-weekly-edge-on-the-rise-exploits-and-a-windows-11-build/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/06/1654340675_38518cc76d1965753247e4d35f82037a_(21)_medium.jpg" alt="" /&gt;&lt;/div&gt;This week&amp;#039;s digest recaps a hefty amount of news related to Microsoft Edge, some about a Windows 11 Dev Channel build, and an exploit that affects virtually all supported versions of Windows. &lt;a href="https://www.neowin.net/news/microsoft-weekly-edge-on-the-rise-exploits-and-a-windows-11-build/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Sat, 04 Jun 2022 17:16:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-weekly-edge-on-the-rise-exploits-and-a-windows-11-build/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/06/1654340675_38518cc76d1965753247e4d35f82037a_(21)_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #MicrosoftWeekly</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google issues warning about state-sponsored hackers from North Korea exploiting Chrome</title>
            <link>https://www.neowin.net/news/google-issues-warning-about-state-sponsored-hackers-from-north-korea-exploiting-chrome/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/03/1648146567_86c25359943c6c8cc87a5fd5b70dcbc3_(3)_medium.jpg" alt="" /&gt;&lt;/div&gt;Google has issued a warning about a sophisticated exploit kit being used to target news media, IT, crypto, and fintech personnel. The attackers were reportedly state-sponsored North Korean groups. &lt;a href="https://www.neowin.net/news/google-issues-warning-about-state-sponsored-hackers-from-north-korea-exploiting-chrome/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Thu, 24 Mar 2022 18:52:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-issues-warning-about-state-sponsored-hackers-from-north-korea-exploiting-chrome/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/03/1648146567_86c25359943c6c8cc87a5fd5b70dcbc3_(3)_story.jpg" width="760" height="428" />
            <neowin:tags>#Google #Chrome #NorthKorea</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft issues warning about Active Directory privilege escalation attack</title>
            <link>https://www.neowin.net/news/microsoft-issues-warning-about-active-directory-privilege-escalation-attack/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2021/06/1623594021_windowspatches_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has issued an advisory about an Active Directory privilege escalation attack. The vulnerabilities have already been patched but unpatched domain controllers are more at risk now than ever. &lt;a href="https://www.neowin.net/news/microsoft-issues-warning-about-active-directory-privilege-escalation-attack/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Tue, 21 Dec 2021 07:04:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-issues-warning-about-active-directory-privilege-escalation-attack/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2021/06/1623594021_windowspatches_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #ActiveDirectory</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google is rolling out emergency fix for Chrome to patch attack exploit</title>
            <link>https://www.neowin.net/news/google-is-rolling-out-emergency-fix-for-chrome-to-patch-attack-exploit/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2021/11/1637041492_chrome96_(1)_medium.jpg" alt="" /&gt;&lt;/div&gt;Thanks to an as yet undisclosed critical vulnerability in Chrome 96, confirmed to be actively being exploited in the wild, Google is rolling out an update to Chrome 96, which y&amp;#039;all should update to. &lt;a href="https://www.neowin.net/news/google-is-rolling-out-emergency-fix-for-chrome-to-patch-attack-exploit/"&gt;Read more...&lt;/a&gt;</description>
            <author>Steven Parker</author>
            <pubDate>Tue, 14 Dec 2021 11:38:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-is-rolling-out-emergency-fix-for-chrome-to-patch-attack-exploit/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2021/11/1637041492_chrome96_(1)_story.jpg" width="760" height="428" />
            <neowin:tags>#Chrome96 #Google #Exploit</neowin:tags>            <neowin:twitter>@aSteveParker</neowin:twitter>        </item>
                <item>
            <title>Razer is fixing a bug which gives admin rights on Windows using just a Razer mouse</title>
            <link>https://www.neowin.net/news/razer-is-fixing-a-bug-which-gives-admin-rights-on-windows-using-just-a-razer-mouse/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2019/11/1573068170_basilisk_ultimate_medium.jpg" alt="" /&gt;&lt;/div&gt;Razer has confirmed that it is working on patching an easily exploitable security issue which allows a local attacker to gain admin privileges to your system using just a Razer mouse or a dongle. &lt;a href="https://www.neowin.net/news/razer-is-fixing-a-bug-which-gives-admin-rights-on-windows-using-just-a-razer-mouse/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Mon, 23 Aug 2021 08:22:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/razer-is-fixing-a-bug-which-gives-admin-rights-on-windows-using-just-a-razer-mouse/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2019/11/1573068170_basilisk_ultimate_story.jpg" width="760" height="428" />
            <neowin:tags>#Razer #Windows</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft releases new patch for PrintNightmare, recommends immediate installation</title>
            <link>https://www.neowin.net/news/microsoft-releases-new-patch-for-printnightmare-recommends-immediate-installation/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2017/03/1488557252_windows-10-hero-wallpaper-2015_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has released another patch for the critical PrintNightmare vulnerability. It makes major changes to the Point and Print functionality on Windows, and immediate installation is recommended. &lt;a href="https://www.neowin.net/news/microsoft-releases-new-patch-for-printnightmare-recommends-immediate-installation/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Tue, 10 Aug 2021 16:58:18 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-releases-new-patch-for-printnightmare-recommends-immediate-installation/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2017/03/1488557252_windows-10-hero-wallpaper-2015_story.jpg" width="760" height="428" />
            <neowin:tags>#PrintNightmare #Windows</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft confirms PrintNightmare patch breaks Zebra printers, but there&#039;s good news too</title>
            <link>https://www.neowin.net/news/microsoft-confirms-printnightmare-patch-breaks-zebra-printers-but-theres-good-news-too/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2019/02/1551024646_patchslash_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has confirmed that its update  KB5004945 breaks Zebra printers preventing them from working properly. The company will release a new patch within the next few days that will fix the problem. &lt;a href="https://www.neowin.net/news/microsoft-confirms-printnightmare-patch-breaks-zebra-printers-but-theres-good-news-too/"&gt;Read more...&lt;/a&gt;</description>
            <author>Sayan Sen</author>
            <pubDate>Fri, 09 Jul 2021 06:00:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-confirms-printnightmare-patch-breaks-zebra-printers-but-theres-good-news-too/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2019/02/1551024646_patchslash_story.jpg" width="760" height="428" />
            <neowin:tags>#printnightmare #CVE20211675</neowin:tags>            <neowin:twitter>@ssc_combater007</neowin:twitter>        </item>
                <item>
            <title>Microsoft: Our PrintNightmare patch is effective, you&#039;re just using Windows wrong</title>
            <link>https://www.neowin.net/news/microsoft-our-printnightmare-patch-is-effective-youre-just-using-windows-wrong/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2019/04/1556405213_patches_medium.jpg" alt="" /&gt;&lt;/div&gt;Despite claims to the contrary, Microsoft says that its PrintNightmare patch works as intended. It states that security researchers who are calling it ineffective are using insecure configurations. &lt;a href="https://www.neowin.net/news/microsoft-our-printnightmare-patch-is-effective-youre-just-using-windows-wrong/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Fri, 09 Jul 2021 04:56:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-our-printnightmare-patch-is-effective-youre-just-using-windows-wrong/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2019/04/1556405213_patches_story.jpg" width="760" height="428" />
            <neowin:tags>#PrintNightmare #Windows</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft&#039;s patch for PrintNightmare vulnerability can be bypassed completely [Update]</title>
            <link>https://www.neowin.net/news/microsofts-patch-for-printnightmare-vulnerability-can-be-bypassed-completely/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2020/10/1604087773_windows_vulnerabiliy_3_medium.jpg" alt="" /&gt;&lt;/div&gt;Security researchers are reporting that Microsoft&amp;#039;s fix for the PrintNightmare vulnerability that rolled out to most Windows versions is ineffective, and can let attackers completely bypass it. &lt;a href="https://www.neowin.net/news/microsofts-patch-for-printnightmare-vulnerability-can-be-bypassed-completely/"&gt;Read more...&lt;/a&gt;</description>
            <author>Abhay V</author>
            <pubDate>Wed, 07 Jul 2021 21:26:02 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsofts-patch-for-printnightmare-vulnerability-can-be-bypassed-completely/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2020/10/1604087773_windows_vulnerabiliy_3_story.jpg" width="760" height="428" />
            <neowin:tags>#PrintNightmare #Microsoft</neowin:tags>            <neowin:twitter>@abhay_venkat4</neowin:twitter>        </item>
                <item>
            <title>Microsoft provides further mitigations for PrintNightmare exploit, awards it &quot;high&quot; severity</title>
            <link>https://www.neowin.net/news/microsoft-provides-further-mitigations-for-printnightmare-exploit-awards-it-high-severity/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2018/01/1516467535_windows10-4_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has offered some further mitigations against the highly dangerous PrintNightmare exploit. The company has also given it a CVSS rating of 8.8/10, which almost awards it &amp;quot;critical&amp;quot; severity. &lt;a href="https://www.neowin.net/news/microsoft-provides-further-mitigations-for-printnightmare-exploit-awards-it-high-severity/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Sun, 04 Jul 2021 05:12:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-provides-further-mitigations-for-printnightmare-exploit-awards-it-high-severity/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2018/01/1516467535_windows10-4_story.jpg" width="760" height="428" />
            <neowin:tags>#PrintNightmare #Windows</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft is investigating a critical Windows Print Spooler exploit called PrintNightmare</title>
            <link>https://www.neowin.net/news/microsoft-is-investigating-a-critical-windows-print-spooler-exploit-called-printnightmare/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2020/10/1604115739_capture_medium.jpg" alt="" /&gt;&lt;/div&gt;An exploit called &amp;quot;PrintNightmare&amp;quot; is being investigated by Microsoft. It potentially affects all versions of Windows. U.S. CISA has marked it as &amp;quot;critical&amp;quot; as it can lead to remote code execution. &lt;a href="https://www.neowin.net/news/microsoft-is-investigating-a-critical-windows-print-spooler-exploit-called-printnightmare/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Fri, 02 Jul 2021 05:48:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-is-investigating-a-critical-windows-print-spooler-exploit-called-printnightmare/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2020/10/1604115739_capture_story.jpg" width="760" height="428" />
            <neowin:tags>#PrintNightmare #Windows</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google discloses new Rowhammer technique that alters memory contents of newer DRAM chips</title>
            <link>https://www.neowin.net/news/google-discloses-new-rowhammer-technique-that-alters-memory-contents-of-newer-dram-chips/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2021/05/1622002612_imagelikeembed_medium.jpg" alt="" /&gt;&lt;/div&gt;&amp;quot;Half-double&amp;quot; is a Rowhammer exploit which grants access to wider memory addresses on newer DRAM chips. Malicious code can potentially take control of the full system through this hardware bypass. &lt;a href="https://www.neowin.net/news/google-discloses-new-rowhammer-technique-that-alters-memory-contents-of-newer-dram-chips/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Wed, 26 May 2021 04:44:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-discloses-new-rowhammer-technique-that-alters-memory-contents-of-newer-dram-chips/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2021/05/1622002612_imagelikeembed_story.jpg" width="760" height="428" />
            <neowin:tags>#Rowhammer #Halfdouble #DRAM</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Exploit released for Windows 10 HTTP protocol flaw that was fixed by update KB5003173</title>
            <link>https://www.neowin.net/news/exploit-released-for-windows-10-http-protocol-flaw-that-was-fixed-by-update-kb5003173/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2018/12/1545126198_w10u-8_medium.jpg" alt="" /&gt;&lt;/div&gt;A security researcher has published code on GitHub that takes advantage of an exploit recently patched by Microsoft. The Redmond firm recommends users install the latest patches to avoid issues. &lt;a href="https://www.neowin.net/news/exploit-released-for-windows-10-http-protocol-flaw-that-was-fixed-by-update-kb5003173/"&gt;Read more...&lt;/a&gt;</description>
            <author>Subir Kathuria</author>
            <pubDate>Mon, 17 May 2021 22:34:02 +0000</pubDate>
            <guid>https://www.neowin.net/news/exploit-released-for-windows-10-http-protocol-flaw-that-was-fixed-by-update-kb5003173/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2018/12/1545126198_w10u-8_story.jpg" width="760" height="428" />
            <neowin:tags>#microsoft #windows #http</neowin:tags>            <neowin:twitter>@subir</neowin:twitter>        </item>
                <item>
            <title>Microsoft Defender will now automatically break the attack chain in Exchange Server exploits</title>
            <link>https://www.neowin.net/news/microsoft-defender-will-now-automatically-break-the-attack-chain-in-exchange-server-exploits/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2021/03/1616167197_ddm-1_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has enabled Defender Antivirus to automatically mitigate a recent vulnerability in on-premises Exchange server instances. This acts only as a temporary workaround to break the attack chain. &lt;a href="https://www.neowin.net/news/microsoft-defender-will-now-automatically-break-the-attack-chain-in-exchange-server-exploits/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Fri, 19 Mar 2021 16:04:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-defender-will-now-automatically-break-the-attack-chain-in-exchange-server-exploits/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2021/03/1616167197_ddm-1_story.jpg" width="760" height="428" />
            <neowin:tags>#ExchangeServer #Antivirus</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Microsoft Weekly: An unfortunate Exchange, Ignite in the spring, and Windows generations</title>
            <link>https://www.neowin.net/news/microsoft-weekly-an-unfortunate-exchange-ignite-in-the-spring-and-windows-generations/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2021/03/1615131527_msw-20210307_medium.jpg" alt="" /&gt;&lt;/div&gt;The week brought us Ignite news, Exchange on-prem vulnerability news, and even some expected Insider build news. Make sure to catch up with everything that happened via our handy overview. &lt;a href="https://www.neowin.net/news/microsoft-weekly-an-unfortunate-exchange-ignite-in-the-spring-and-windows-generations/"&gt;Read more...&lt;/a&gt;</description>
            <author>Florin Bodnarescu </author>
            <pubDate>Sun, 07 Mar 2021 15:52:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-weekly-an-unfortunate-exchange-ignite-in-the-spring-and-windows-generations/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2021/03/1615131527_msw-20210307_story.jpg" width="760" height="428" />
            <neowin:tags>#MicrosoftWeekly #Microsoft</neowin:tags>                    </item>
                <item>
            <title>On-premises Exchange servers are under attack from a state-sponsored group</title>
            <link>https://www.neowin.net/news/on-premises-exchange-servers-are-under-attack-from-a-state-sponsored-group/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2015/07/microsoft-exchange-01_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has revealed that on-premises Exchange servers are under attack from a state-sponsored group operating from China and utilizing 0-day exploits. Exchange Online is safe from the threat. &lt;a href="https://www.neowin.net/news/on-premises-exchange-servers-are-under-attack-from-a-state-sponsored-group/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Wed, 03 Mar 2021 13:04:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/on-premises-exchange-servers-are-under-attack-from-a-state-sponsored-group/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2015/07/microsoft-exchange-01_story.jpg" width="760" height="428" />
            <neowin:tags>#ExchangeServer #Microsoft</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google&#039;s Threat Analysis Group uncovers an ongoing campaign targeting security researchers</title>
            <link>https://www.neowin.net/news/googles-threat-analysis-group-uncovers-an-ongoing-campaign-targeting-security-researchers/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2015/09/google-logo-2015-alternatives-fp_medium.jpg" alt="" /&gt;&lt;/div&gt;Malicious actors, reportedly from North Korea, are targeting security researchers with social engineering attacks using fake social media accounts, exploit claims, and injected malware. &lt;a href="https://www.neowin.net/news/googles-threat-analysis-group-uncovers-an-ongoing-campaign-targeting-security-researchers/"&gt;Read more...&lt;/a&gt;</description>
            <author>Ather Fawaz</author>
            <pubDate>Tue, 26 Jan 2021 06:56:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/googles-threat-analysis-group-uncovers-an-ongoing-campaign-targeting-security-researchers/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2015/09/google-logo-2015-alternatives-fp_story.jpg" width="760" height="428" />
            <neowin:tags>#Google #TAG #Security</neowin:tags>            <neowin:twitter>@AtherFawaz</neowin:twitter>        </item>
                <item>
            <title>iPhones of multiple Al Jazeera journalists hit by a zero-click hack</title>
            <link>https://www.neowin.net/news/iphones-of-multiple-al-jazeera-journalists-hit-by-a-zero-click-hack/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2020/11/1604219675_iphone_12_notch_medium.jpg" alt="" /&gt;&lt;/div&gt;According to a report, dozens of journalists - mostly from Al Jazeera - had their iPhones hacked via an Israeli firm&amp;#039;s spyware. Four attackers have been linked to the UAE and Saudi Arabia. &lt;a href="https://www.neowin.net/news/iphones-of-multiple-al-jazeera-journalists-hit-by-a-zero-click-hack/"&gt;Read more...&lt;/a&gt;</description>
            <author>Ather Fawaz</author>
            <pubDate>Mon, 21 Dec 2020 06:10:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/iphones-of-multiple-al-jazeera-journalists-hit-by-a-zero-click-hack/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2020/11/1604219675_iphone_12_notch_story.jpg" width="760" height="428" />
            <neowin:tags>#iPhone #AlJazeera #Hack</neowin:tags>            <neowin:twitter>@AtherFawaz</neowin:twitter>        </item>
                <item>
            <title>Google now offering bigger bounties for finding exploits in Chrome&#039;s JavaScript engine</title>
            <link>https://www.neowin.net/news/google-now-offering-bigger-bounties-for-finding-exploits-in-chromes-javascript-engine/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2016/02/google-chrome-logo-2015_medium.jpg" alt="" /&gt;&lt;/div&gt;Google has updated the rules for its Chrome Vulnerability Rewards Program, offering bigger bounties and bonuses for security researchers who discover security exploits in Chrome&amp;#039;s JavaScript engine. &lt;a href="https://www.neowin.net/news/google-now-offering-bigger-bounties-for-finding-exploits-in-chromes-javascript-engine/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Wed, 09 Dec 2020 06:10:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-now-offering-bigger-bounties-for-finding-exploits-in-chromes-javascript-engine/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2016/02/google-chrome-logo-2015_story.jpg" width="760" height="428" />
            <neowin:tags>#Google #Chrome #JavaScript #V8</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Sony is permanently banning PS5 owners selling access to PlayStation Plus Collection</title>
            <link>https://www.neowin.net/news/sony-is-permanently-banning-ps5-owners-selling-access-to-playstation-plus-collection/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2019/10/1570538702_ps5_medium.jpg" alt="" /&gt;&lt;/div&gt;Sony is issuing permanent bans to PlayStation 5 owners who are engaging in an exploitative technique of selling access to the PlayStation Plus Collection games available for free on their new console. &lt;a href="https://www.neowin.net/news/sony-is-permanently-banning-ps5-owners-selling-access-to-playstation-plus-collection/"&gt;Read more...&lt;/a&gt;</description>
            <author>Usama Jawad</author>
            <pubDate>Fri, 27 Nov 2020 06:30:02 +0000</pubDate>
            <guid>https://www.neowin.net/news/sony-is-permanently-banning-ps5-owners-selling-access-to-playstation-plus-collection/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2019/10/1570538702_ps5_story.jpg" width="760" height="428" />
            <neowin:tags>#Sony #Permaban #PS5 #PSPlus</neowin:tags>            <neowin:twitter>@UsamaJawad96</neowin:twitter>        </item>
                <item>
            <title>Google discloses a zero-day vulnerability in Windows, currently exploited in the wild</title>
            <link>https://www.neowin.net/news/google-discloses-zero-day-vulnerability-in-windows-currently-exploited-in-the-wild/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2020/10/1604087773_windows_vulnerabiliy_3_medium.jpg" alt="" /&gt;&lt;/div&gt;Google&amp;#039;s Project Zero team has disclosed a zero-day vulnerability in Windows that enables elevated code execution that is currently being exploited. Microsoft is expected to patch the bug next month. &lt;a href="https://www.neowin.net/news/google-discloses-zero-day-vulnerability-in-windows-currently-exploited-in-the-wild/"&gt;Read more...&lt;/a&gt;</description>
            <author>Abhay V</author>
            <pubDate>Fri, 30 Oct 2020 20:32:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/google-discloses-zero-day-vulnerability-in-windows-currently-exploited-in-the-wild/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2020/10/1604087773_windows_vulnerabiliy_3_story.jpg" width="760" height="428" />
            <neowin:tags>#ProjectZero #Zeroday #Windows</neowin:tags>            <neowin:twitter>@abhay_venkat4</neowin:twitter>        </item>
                <item>
            <title>Twitter says state-actors may have gained access to people&#039;s phone numbers</title>
            <link>https://www.neowin.net/news/twitter-says-state-actors-may-have-gained-access-to-peoples-phone-numbers/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2019/12/1576098963_twitter_medium.jpg" alt="" /&gt;&lt;/div&gt;Twitter has revealed that hackers attempted to match phone numbers to Twitter usernames. It said the hack may have been state-backed, possibly being linked to Iran, Israel, or Malaysia. &lt;a href="https://www.neowin.net/news/twitter-says-state-actors-may-have-gained-access-to-peoples-phone-numbers/"&gt;Read more...&lt;/a&gt;</description>
            <author>Paul Hill</author>
            <pubDate>Tue, 04 Feb 2020 08:08:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/twitter-says-state-actors-may-have-gained-access-to-peoples-phone-numbers/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2019/12/1576098963_twitter_story.jpg" width="760" height="428" />
            <neowin:tags>#Twitter #Hack</neowin:tags>            <neowin:twitter>@ziks_99</neowin:twitter>        </item>
                <item>
            <title>Linux/Unix exploit allows some restricted commands to be run as root without clearance</title>
            <link>https://www.neowin.net/news/linuxunix-exploit-allows-some-restricted-commands-to-be-run-as-root-without-clearance/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2019/07/1562637959_code-codes-coding-207580_medium.jpg" alt="" /&gt;&lt;/div&gt;A subset of users with sudo access could have run commands restricted to root users by leveraging a discovered exploit in a function return call that changes the user ID in Linux and Unix systems. &lt;a href="https://www.neowin.net/news/linuxunix-exploit-allows-some-restricted-commands-to-be-run-as-root-without-clearance/"&gt;Read more...&lt;/a&gt;</description>
            <author>Ather Fawaz</author>
            <pubDate>Tue, 15 Oct 2019 06:54:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/linuxunix-exploit-allows-some-restricted-commands-to-be-run-as-root-without-clearance/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2019/07/1562637959_code-codes-coding-207580_story.jpg" width="760" height="428" />
            <neowin:tags>#Linux #Unix #Sudo</neowin:tags>            <neowin:twitter>@AtherFawaz</neowin:twitter>        </item>
                <item>
            <title>Microsoft issues fixes for two critical, wormable vulnerabilities in Windows</title>
            <link>https://www.neowin.net/news/microsoft-issues-fixes-for-two-critical-wormable-vulnerabilities-in-windows/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2017/03/1490748311_mscloudsecurity_medium.jpg" alt="" /&gt;&lt;/div&gt;Microsoft has identified and patched two critical vulnerabilities in Windows Remote Desktop Services that affect Windows 7 through 10. The two Bluekeep-like vulnerabilities are also wormable. &lt;a href="https://www.neowin.net/news/microsoft-issues-fixes-for-two-critical-wormable-vulnerabilities-in-windows/"&gt;Read more...&lt;/a&gt;</description>
            <author>Muhammad Jarir Kanji</author>
            <pubDate>Tue, 13 Aug 2019 22:04:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-issues-fixes-for-two-critical-wormable-vulnerabilities-in-windows/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2017/03/1490748311_mscloudsecurity_story.jpg" width="760" height="428" />
            <neowin:tags>#Microsoft #Exploit #Security</neowin:tags>            <neowin:twitter>@mjkanji</neowin:twitter>        </item>
                <item>
            <title>German cybersecurity agency identifies critical flaw in VLC Media Player [Update]</title>
            <link>https://www.neowin.net/news/german-cybersecurity-agency-identifies-critical-flaw-in-vlc-media-player/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2017/11/1512060529_vlc_videolan_media_player_medium.jpg" alt="" /&gt;&lt;/div&gt;CERT-Bund, the computer emergency response team of Germany, has identified a critical security flaw in the popular VLC Media Player that would allow remote code execution and more. &lt;a href="https://www.neowin.net/news/german-cybersecurity-agency-identifies-critical-flaw-in-vlc-media-player/"&gt;Read more...&lt;/a&gt;</description>
            <author>Muhammad Jarir Kanji</author>
            <pubDate>Sat, 20 Jul 2019 18:30:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/german-cybersecurity-agency-identifies-critical-flaw-in-vlc-media-player/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2017/11/1512060529_vlc_videolan_media_player_story.jpg" width="760" height="428" />
            <neowin:tags>#VLC #Security</neowin:tags>            <neowin:twitter>@mjkanji</neowin:twitter>        </item>
        	</channel>
</rss>
