Hackers Use Malicious Excel Files to Deliver Remcos RAT to Windows Users
Hackers exploit Excel documents due to their popularity and built-in vulnerabilities. With VBA macros now [...]
Hackers exploit Excel documents due to their popularity and built-in vulnerabilities. With VBA macros now [...]
XWorm is a malware known for its obfuscation techniques and ability to evade detection, posing [...]
Adobe's September 2024 updates fixed 28 vulnerabilities, including a critical ColdFusion flaw (CVSS 9.8). Other [...]
DeadXInject, the group behind AresLoader and AiDLocker ransomware, is now offering ManticoraLoader, a new Malware-as-a-Service [...]
Proofpoint researchers have uncovered a cyberattack campaign, "Voldemort," using Google Sheets as a C2 platform. [...]