North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Use Windows Sandbox to safely install and test unknown apps in an isolated environment. Protect your PC from malware and ...
StealC malware campaign exploits fake CAPTCHA pages to steal sensitive data while blending into normal system activity.
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.
Microsoft details a new ClickFix variant abusing DNS nslookup commands to stage malware, enabling stealthy payload delivery ...
Microsoft patches Windows 11 Notepad RCE flaw CVE-2026-20841 Vulnerability exploited Markdown links to execute malicious code with user permissions Patch Tuesday update fixes issue; versions 11.2510 ...
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in exploits, defenders might have hoped use of this tactic would decline. They were ...
Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture. Image generated by Google Gemini A sophisticated ...
A new campaign creates a fake BSOD to install malware. The campaign tricks users into installing a remote access trojan. If executed, the RAT can remotely access the infected PC. The Windows Blue ...
Tired of all the Microsoft AI slop? You can remove it entirely. Some people love AI. If you're not one of them (or if you have a favorite AI tool that isn't baked into it), using Windows 11 can feel ...