Cybercriminals are using Google search ads to distribute malware disguised as legitimate ads for Slack. This advanced...
Exploitation
Recent Log4j attacks use obfuscated LDAP requests to execute malicious scripts, establish persistence, and exfiltrate data. Multiple...
A critical security vulnerability affects Dell SupportAssist for Home PCs, specifically in installer version 4.0.3. Dell SupportAssist...
The notorious Lazarus hacker group exploited a zero-day vulnerability in Microsoft Windows, targeting the Ancillary Function Driver...
In July 2022, Microsoft patched a PPL bypass flaw, but a new exploit called “BYOVDLL” has been...