Tag: Files
-
Magika 1.0: Smarter, Faster File Detection with Rust and AI
Google has just released version 1.0 of Magika, a substantial rewrite of its open-source file type detection system. The new version …
-
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to …
-
Minimizing Downtime: Repairing Corrupt Outlook Files In Hybrid Work Environments
You open Outlook. Nothing …
-
Russian-linked Malware Campaign Hides in Blender 3D Files
A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months. According to …
-
PDFBear: Your Online Alternative In Merging PDF Files
Why do we need to merge PDF files? Well, handling one PDF file is way easier than working with …
-
Nightfall’s AI File Classifier Detectors bring LLM intelligence to unstructured IP protection
Nightfall announced the launch of AI File Classifier Detectors, the first solution to use large language models (LLMs) to classify and …
-
Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the …
-
Google Files Lawsuit to Dismantle ‘Lighthouse’ Smishing Kit
Google has taken legal action to dismantle a phishing-as-a-service (PhaaS) network likely operated from China as SMS phishing (smishing) …
-
Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Files Anywhere on Target Systems
Ivanti has released critical security updates for Ivanti Endpoint Manager to address three high-severity vulnerabilities that could allow …
-
Intel Sues Ex-Engineer for Stealing 18,000 ‘Top Secret’ Files
Intel, the leading computer chip maker, has filed a lawsuit seeking at least $250,000 in damages from a former software engineer, Jinfeng …
-
Gootloader Returns with a New ZIP File Tactic to Conceal Malicious Payloads
Cybersecurity researchers have discovered a resurgent Gootloader malware campaign employing sophisticated new evasion techniques that …
-
EDR-Redir V2 Evades Detection on Windows 11 by Faking Program Files
EDR-Redir V2, an upgraded evasion tool that exploits Windows bind link technology to bypass endpoint detection and response solutions on …
●●●
