Toggle light / dark theme

Outcomes After Minor Ischemic Stroke in Older Patients Treated With IV Thrombolysis vs Standard of Care in the TEMPO-2 Trial

This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

New GhostLock tool abuses Windows API to block file access

A security researcher has released a proof-of-concept tool named GhostLock that demonstrates how a legitimate Windows file API can be abused in attacks to block access to files stored locally or on SMB network shares.

This technique, created by Kim Dvash of Israel Aerospace Industries, abuses the Windows ‘CreateFileW’ API and file-sharing modes to prevent other users and applications from opening files while handles remain active.

The GhostLock technique abuses the ‘dwShareMode’ parameter in the CreateFileW function, which specifies the type of access other processes have to a file while it is opened.

Google: Hackers used AI to develop zero-day exploit for web admin tool

Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web administration tool was likely generated using AI.

The exploit could be leveraged to bypass the two-factor authentication (2FA) protection in a popular open-source, web-based system administration tool that remains unnamed.

Although the attack was foiled before the mass exploitation phase, the incident shows that threat actors are relying more on AI assistance for their vulnerability discovery and exploitation efforts.

Characterizing Individuals Fulfilling Clinical Criteria for Limbic-Predominant Age-Related TDP-43 Encephalopathy in a Tertiary Memory Clinic

This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

New Linux ‘Dirty Frag’ zero-day gives root on all major distros

A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command.

Security researcher Hyunwoo Kim, who disclosed it earlier today and published a proof-of-concept (PoC) exploit, says this local privilege escalation was introduced roughly nine years ago in the Linux kernel’s algif_aead cryptographic algorithm interface.

Dirty Frag works by chaining two separate kernel flaws, the xfrm-ESP Page-Cache Write vulnerability and the RxRPC Page-Cache Write vulnerability, to modify protected system files in memory without authorization and achieve privilege escalation.

Effect of Cognitive Reserve on Age at Symptom Onset and Cognitive Decline in Individuals With Dominantly Inherited Alzheimer Disease

This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

Efficacy and Safety of Amifampridine in Myasthenia GravisA Randomized, Double-Blind, Placebo-Controlled Crossover Trial

Class I evidence that in patients with AChRAb+ myasthenia gravis, the addition of amifampridine to pyridostigmine was not superior to treatment with pyridostigmine alone and was associated with a higher incidence of adverse events.


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

Teaching NeuroImage: Bilateral Posterior Limb Internal Capsule T2 Hyperintensity and Severe Cerebellar Atrophy in 2 Lifelong Friends

This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

/* */