Researchers uncover malware campaigns using cracked software and compromised YouTube videos to deliver CountLoader, ...
Abstract: Executing a macro from VBA is a crossroad that is very well used in Offensive security since attackers can run the application directly on memory to avoid security alerts. This paper is a ...
A newly discovered vulnerability in WinRAR has been exploited in the wild by the Russia-aligned cyber group RomCom. According to an advisory published by ESET researchers earlier today, the flaw, ...
Russian state-backed threat actors known as APT28 have launched a new wave of cyberattacks against Ukrainian government entities by weaponizing Signal chats to drop malware. Signal, the widely used ...
ESET researchers discovered a previously unknown vulnerability in Mozilla products, exploited in the wild by Russia-aligned group RomCom. This is at least the second time that RomCom has been caught ...
Microsoft Word has introduced 12 new features across desktop, web, and iOS platforms for Summer 2024. Designed to enhance your productivity and streamline your workflow across desktop, web, and iOS ...
Chinese organizations are being targeted with a new evasive malware loader called SquidLoader. Cybersecurity researchers from AT&T LevelBlue Labs found threat actors have been active since at least ...
Microsoft Word is one of the most widely used programs in the world, yet it’s also one that many complain about. The most common criticism? That it’s heavy, slow, and a typical example of “feature ...
Have you encountered a Word file corruption issue with a notice: “Word experienced an error trying to open the file”? Microsoft Word will offer three solutions to ...
Abstract: As users become more cautious about executable programs, malicious document attacks have become popular, and the proportion of malicious document attacks has become higher and higher.