How can an attacker execute malware through a script?
Over the last four years, the share of script-based attacks of malware…
PUABundler:Win32/CandyOpen (PUA OpenCandy)
PUABundler:Win32/CandyOpen (or OpenCandy) is an unwanted program that acts as a browser…
Hellminer.exe Coin Miner
Hellminer.exe is a process you can see in the Task Manager that…
rsEngineSvc.exe Process: Reason Core Security Engine Service
RsEngineSvc.exe is an executable file associated with RAV Antivirus, a program developed…
AcroTray.exe
The Acrotray.exe process is one of the important components provided by Adobe…
Malware vs Virus
It is particularly easy to hear people calling the same thing malware…
Program:Win32/Uwamson.A!ml
Win32/Uwamson.A!ml is a specific name of a Microsoft Defender detection. This designation…
VirTool:Win32/DefenderTamperingRestore
VirTool:Win32/DefenderTamperingRestore is the name of the Microsoft Defender detection of a malicious…
Infostealers Made With Electron On The Rise
AhnLab Security Intelligence Center (ASEC) has identified a new strain of Infostealer…
GitHub and GitLab CDNs Abused to Spread Malware
Recent research around new spreading approaches of one stealer malware family revealed…
OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes
Microsoft security blog reports that the OpenMetadata platform has critical vulnerabilities that…