🕐 --:--
-- --
عاجل
⚡ عاجل: كريستيانو رونالدو يُتوّج كأفضل لاعب كرة قدم في العالم ⚡ أخبار عاجلة تتابعونها لحظة بلحظة على خبر ⚡ تابعوا آخر المستجدات والأحداث من حول العالم
⌘K
AI مباشر
397450 مقال 248 مصدر نشط 79 قناة مباشرة 3966 خبر اليوم
آخر تحديث: منذ 0 ثانية

How To Mitigate The Microsoft Windows BitLocker ‘Angry Hacker’ 0-Day

تكنولوجيا
Forbes
2026/05/20 - 14:16 504 مشاهدة
InnovationCybersecurityHow To Mitigate The Microsoft Windows BitLocker ‘Angry Hacker’ 0-DayByDavey Winder,Senior Contributor.Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst.Follow AuthorMay 20, 2026, 10:16am EDT--:-- / --:--This voice experience is generated by AI. Learn more.This voice experience is generated by AI. Learn more.Microsoft publishes angry hacker YellowKey zero-day mitigation.gettyAs an angry hacker going by the moniker Chaotic Eclipse continues to release zero-day exploit code, Microsoft has now released mitigation advice for the YellowKey Windows BitLocker vulnerability that can bypass security features. Here’s what you need to know until a full security update is rolled out to users.ForbesMicrosoft Confirms Surprising Edge Password Security U-TurnBy Davey WinderHow To Mitigate The YellowHammer Microsoft BitLocker Zero-Day VulnerabilityIt has been quite the week for Microsoft users when it comes to zero-day threat mitigation advice. Hot on the heels of the Microsoft recommendation to check the Exchange Emergency Mitigation Service if you use Exchange Server, as CVE-2026-42897 is confirmed as already under attack, comes fresh mitigation advice for Windows BitLocker users after the public release of security bypass exploit code by a researcher with a grudge about the way Microsoft Security Response Center responded to their vulnerability reports. That vulnerability, now tracked on the Common Vulnerabilities and Exposures database as CVE-2026-45585, and better known as YellowKey, could enable an attacker to gain access to BitLocker-protected storage using nothing more than a maliciously prepared USB key.Organizations should treat this as an active threat, Neena Sharma, a cybersecurity specialist at Filigran, told me at the time, advising that, as immediate patching isn’t possible, they should implement “compensating controls like restricting USB boot access."Fo...
مشاركة:

مقالات ذات صلة

AI
يا هلا! اسألني أي شي 🎤