PANews reported on April 21 that recently, the Japanese security team CSIRT revealed a security vulnerability in WinRAR that can bypass Microsoft Windows' Mark of the Web (MoTW) security mechanism, allowing users to execute malicious programs from the network without knowing it, causing serious security risks. The vulnerability is numbered CVE-2025-31334. In order to actively respond to the network security challenges brought by the WinRAR security vulnerability to our critical infrastructure, it is recommended to take the following measures from a technical level: First, comprehensively check the computer network devices involved in the vulnerability among WinRAR users and install the latest version in a timely manner. Second, reset the WinRAR client configuration. Third, it is recommended that WinRAR users avoid connecting to untrusted networks when processing sensitive data.
National Cybersecurity Reporting Center: WinRAR security vulnerability can bypass Windows security warnings and execute malware
- 2025-05-14
Gate.io Alpha has launched SNS, STARTUP, Glonk, and ICM
- 2025-05-14
New SEC Chairman Atkins' first long speech: Reconstructing the regulatory framework for crypto assets, and promoting the securities blockchain revolution in three areas
- 2025-05-13
sns.sol has opened the SNS token airdrop, the deadline is August 11
- 2025-05-13
Market News: OpenAI considers building a data center in the UAE
- 2025-05-13
Virtuals Protocol Launches VIRTUAL Staking Feature
- 2025-05-13
Trump receives $600 billion investment pledge from Saudi Arabia