Two fake spellchecker packages on PyPI hid a Python RAT in dictionary files, activating malware on import in version 1.2.0.
A phishing campaign targeting carefully selected “high-value” corporate employees has been using LinkedIn direct messages to deliver weaponized downloads, highlighting how criminals are shifting away ...
Researchers found a LinkedIn phishing campaign delivering a remote access trojan via DLL sideloading, WinRAR SFX files, and ...
The Python-based information stealer SolyxImmortal uses legitimate APIs and libraries for stealthy data gathering and ...
New WhatsApp Web attack spreads self-propagating ZIP files containing Astaroth banking malware through trusted conversations.
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade ...
A Russian-linked campaign delivers the StealC V2 information stealer malware through malicious Blender files uploaded to 3D model marketplaces like CGTrader. Blender is a powerful open-source 3D ...
Yes, Launcher.exe is often a secure file when it is present in the official installation directory related to the app on your computer, especially in C:\Program Files However, if the file is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results