News

A threat actor targeted low-skilled hackers, known as ‘script kiddies’ with a fake malware builder that secretly infected them with a backdoor to st ...
IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
A sophisticated cyber‑espionage operation is exploiting Windows shortcut files disguised alongside seemingly genuine PDF newsletters to surreptitiously infiltrate institutions across Asia and the ...
Ever searched for a file in Windows and come up empty? Or waited way too long for results? You’re not alone. Many users find Windows Search frustrating and it really boils down to its default settings ...
Dozens of porn sites are turning to a familiar source to generate likes on Facebook—malware that causes browsers to surreptitiously endorse the sites. This time, the sites are using a newer vehicle ...
Abstract: Modern computing environments increasingly suffer from security threats that exploit vulnerabilities in executable programs and script files. Traditional antivirus solutions relying on ...
In the summer of 2024, corporate anti-malware provider CrowdStrike pushed a broken update to millions of PCs and servers running some version of Microsoft's Windows software, taking down systems that ...
A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain. Dubbed Serpentine#Cloud, the campaign relies on a complex infection chain ...
Using a Windows 11 PC is a great experience, but what about protecting it from cybercriminals with bad intentions? Fortunately, your Windows 11 PC comes with Windows Security built in, and it does a ...