News

A new Go-based malware, XDigo, targets Eastern European governments and organizations, exploiting Windows LNK vulnerability ...
The use of LNK files to distribute malware is not new. It used to be very common with worms that copied themselves to USB sticks and relied on users to open them.
Don't open LNK files from unverified sources. Ensure Microsoft Defender or the antivirus software remains updated. Pay attention to security warnings displayed by Windows.
PALO ALTO, Calif., Aug. 15, 2022 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today issued its quarterly Threat Insights Report revealing that a wave of cybercriminals spreading malware families ...
The Emotet botnet is now using Windows shortcut files (.LNK) containing PowerShell commands to infect victims computers, moving away from Microsoft Office macros that are now disabled by default.
When Peaklight runs on a target PC, it does a quick check to see if the payloads are installed. If not, it starts downloading ...
I downloaded a file that masqueraded as a video file, but is in reality a lnk file with shell code. Only 3 of the Virustotal engines classify it as malware. They describe it as: LNK/TrojanDropper ...
Just by accessing a folder containing a malicious SCF file, a user will unwittingly share his computer's login credentials with an attacker via Google Chrome and the SMB protocol.
In this case, a fake button inside the Notebook file that reads “Open” is used to run any attachments included by the attackers. How to stay safe from malicious email attachments ...
Don't open LNK files from unverified sources. Ensure Microsoft Defender or the antivirus software remains updated. Pay attention to security warnings displayed by Windows.