DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
A series of malicious LNK files targeting users in South Korea has been detected using a multi-stage attack chain that uses GitHub as command and control (C2) infrastructure.
Attackers are exploiting trust in Adobe’s brand to deliver covert remote access, using a fake Acrobat Reader download page to install ConnectWise ScreenConnect through a fileless, memory-heavy attack ...
The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted ...
Cargo-stealing hackers have a new trick up their sleeve: using a third-party code-signing service makes their remote ...
A new malware family named 'AgingFly' has been identified in attacks against local governments and hospitals that steal ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
The most useful security tool you've never heard of is now shipping with your OS.
Updated: Hijacked maintainer account let attackers slip cross-platform trojan into 100M-downloads-a-week Axios ...
Winhance is an open-source Windows utility to debloat, optimize, and customize Windows 10/11, improving performance, privacy, ...