The campaign exploits an Office vulnerability to deliver the modular XWorm RAT, chaining HTA, PowerShell, and in-memory .NET execution to sidestep detection and expand post-compromise control.
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware.
Business.com on MSN
PowerShell: Everything you need to know
What is PowerShell? Microsoft PowerShell is a powerful administrative tool that can help you automate tasks for your computer ...
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
Abstract: Modern computing environments increasingly suffer from security threats that exploit vulnerabilities in executable programs and script files. Traditional antivirus solutions relying on ...
CrashFix crashes browsers to coerce users into executing commands that deploy a Python RAT, abusing finger.exe and portable Python to evade detection and persist on high‑value systems.
Managing Microsoft 365 and Azure Active Directory resources efficiently often requires automation tools beyond standard admin ...
DEAD#VAX campaign delivers AsyncRAT via IPFS-hosted VHD phishing files, using fileless memory injection and obfuscated ...
Active attacks exploit Metro4Shell (CVE-2025-11953) in React Native CLI to execute commands and deploy Rust malware.
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector.
Abstract: Malware is one of the leading cybersecurity challenges, as it disrupts the normal use of devices, causes financial losses, and steals user information. Deep learning-based methods have been ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results