PANews reported on April 21 that recently, the Japanese security team CSIRT revealed a security vulnerability in WinRAR that can bypass Microsoft Windows' Mark of the Web (MoTW) security mechanism, allowing users to execute malicious programs from the network without knowing it, causing serious security risks. The vulnerability is numbered CVE-2025-31334. In order to actively respond to the network security challenges brought by the WinRAR security vulnerability to our critical infrastructure, it is recommended to take the following measures from a technical level: First, comprehensively check the computer network devices involved in the vulnerability among WinRAR users and install the latest version in a timely manner. Second, reset the WinRAR client configuration. Third, it is recommended that WinRAR users avoid connecting to untrusted networks when processing sensitive data.
National Cybersecurity Reporting Center: WinRAR security vulnerability can bypass Windows security warnings and execute malware
- 2025-05-16
In the past 24 hours, the total network contract liquidation was 257 million US dollars, mainly long orders
- 2025-05-16
Bo Hines: GENIUS Act aims to consolidate US financial dominance
- 2025-05-16
OpenAI launches research preview of Codex, a cloud-based software engineering agent
- 2025-05-16
Modular blockchain Sophon will launch SOPH main token in May
- 2025-05-16
Binance launches SUI Ecosystem Trading Competition with a total prize pool of $1.7 million
- 2025-05-16
Solv Launches First Institutional-Grade BTC Real Yield Protocol, Connects BlackRock and Hamilton Lane Assets