Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
The malware is arriving through a torrent for One Battle After Another. Pirated downloads of the film have been circulating ...
A fake torrent for Leonardo DiCaprio's 'One Battle After Another' hides malicious PowerShell malware loaders inside subtitle ...
Microsoft quietly issued a fix for a long-exploited Windows zero-day vulnerability in its November security updates, closing ...
Microsoft quietly patched CVE-2025-9491, a Windows LNK flaw abused by state actors since 2017 for malware attacks ...
The flaw, tracked as CVE-2025-9491, allowed cybercriminals to hide malicious commands from users inspecting files through ...
Microsoft has released a patch for link (LNK) files. However, it does not stop hackers from abusing them to deliver malware.
Silent Patch Tuesday mitigation ends ability to hide malicious commands in .lnk files Microsoft has quietly closed off a ...
The LNK vulnerability was used to launch remote code execution in cyber-espionage, data theft, and fraud attacks.
A third-party patch management company is cutting short attackers’ use of LNK files to smuggle in malicious commands, while ...
In other words, these shortcut files are crafted such that viewing their properties in Windows conceals the malicious ...