Exploiting .lnk files is a strategy that has been used for years and still works, says new report from Forcepoint.
Attackers that want to use artificial intelligence tools to build ransomware or help run their cyber operations risk getting much less than they bargained for, said ...
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
ESET shares findings of its H2 2025 Threat Report based on its telemetry research, highlighting the ongoing impact of ...
Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
Key cyber updates on ransomware, cloud intrusions, phishing, botnets, supply-chain risks, and nation-state threat activity.
The program is a free text and code editor that's been downloaded millions of times. The compromise began in June and is ...
How AI and agentic AI are reshaping malware and malicious attacks, driving faster, stealthier, and more targeted ...
CCI staff share recent surveys, reports and analysis on risk, compliance, governance, infosec and leadership issues. Share details of your ...
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector.
A prolific initial access broker tracked as TA584 has been observed using the Tsundere Bot alongside XWorm remote access ...
Ransomware is no longer just an enterprise problem. Learn how you can protect customers by integrating security features and ...