Windows Zombie Vulnerability from 1997 still active in Windows 10

The CERT division of Carnegie Mellon and the security researchers from Cylance were capable of exploiting a zombie vulnerability which can be found in all Windows operating systems. Yes, even if you have the latest Windows operating system, you will still be vulnerable to hackers and cybercriminals which find a way to exploit the Zombie […]



This is a small post about┬áZombie. This post will provide you some insight on Zombie. Zombie A system that has been taken over using Remote Control Software. Zombies are often used to send spam or to attack remote servers with an overwhelming amount of traffic, a┬áDistributed Denial-of-Service (DDoS) Attack. A collection of many zombies comprise […]