A critical security flaw, identified as CVE-2024-11477, has been discovered in 7-Zip, a widely used file compression and archiving tool. The vulnerability lies within the Zstandard decompression function, where improper validation of user-provided input can lead to an integer underflow. This flaw could enable attackers to execute arbitrary code within the application's process, posing a serious threat to affected systems. Discovered by Nicholas Zubrisky from Trend Micro Security Research, the vulnerability has been rated with a CVSS score of 7.8, reflecting its high exploitability. Attackers can leverage this issue by tricking users into opening maliciously crafted archive files, potentially leading to remote code execution. If successfully exploited, the consequences could include unauthorized access to sensitive data or full control of the targeted system. While exploiting this vulnerability requires user interaction, the methods may vary depending on the implementation of the Zstandard decompression function. To mitigate the risk, users are urged to update 7-Zip to the latest version as soon as possible to safeguard their systems against potential threats.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...