News

Unfortunately, WinRAR doesn’t have an auto-update feature, so users will need to download and install the new version ...
When Peaklight runs on a target PC, it does a quick check to see if the payloads are installed. If not, it starts downloading ...
Malware campaign abuses Cloudflare Tunnel and phishing lures to deliver in-memory RATs across multiple regions.
Don't open LNK files from unverified sources. Ensure Microsoft Defender or the antivirus software remains updated. Pay attention to security warnings displayed by Windows.
The administration has ended free income tax filing, but that didn't stop the IRS from open-sourcing its frontend Direct File tax program.
Direct File getting open-sourced comes at a time when there is a target on the program’s back. The Trump administration, Elon Musk, and tax lobbyists have set out to kill Direct File in one way ...
The infection begins with spear-phishing emails that direct victims to a malicious ZIP archive hosted on a hijacked government website. The archive contains a Windows shortcut file (LNK) that ...
Files and links that you receive could be infected with viruses. If you are ever unsure whether a file is harmless or whether a link leads to a safe website, check it in an online sandbox.
However, for years threat actors have been using specially crafted LNK files that embed command-line arguments for Cmd or PowerShell that are designed to download and execute malware. ZDI has ...
The LNK file launched cmd[.]exe, the report said, and then used mshta[.] ... New AI tool targets critical hole in thousands of open source apps. Jun 9, 2025 1 min. news.
I downloaded a file that masqueraded as a video file, but is in reality a lnk file with shell code. Only 3 of the Virustotal engines classify it as malware. They describe it as: LNK/TrojanDropper ...
6) Be wary of compressed files (ZIP, RAR): Compressed files are a common method for hiding malware. Even if they appear to be pirated movies, they could contain LNK files or other malicious scripts.