By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
Attackers have uploaded over 300 malicious skills to OpenClaw's AI marketplace, turning it into a malware delivery system ...
Did a Windows update break the shutdown process? Try these tested methods to fix the Windows shutdown problem on your PC.
A complex phishing campaign uses decentralized fake PDFs that mount virtual drives to silently install the AsyncRAT malware.
Security researchers uncover evidence that the Windows-based 'RenEngine loader' malware has infected around 30,000 users in ...
CrashFix crashes browsers to coerce users into executing commands that deploy a Python RAT, abusing finger.exe and portable Python to evade detection and persist on high‑value systems.
DEAD#VAX campaign delivers AsyncRAT via IPFS-hosted VHD phishing files, using fileless memory injection and obfuscated ...
A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 ...
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
The program is a free text and code editor that's been downloaded millions of times. The compromise began in June and is ...
Two malware campaigns weaponize open-source software to target executives and cloud systems, combining social engineering ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results