How Cracks and Installers Bring Malware to Your Device

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Credit to Author: Sarah Pearl Camiling| Date: Thu, 09 Jan 2025 00:00:00 +0000

Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.

Read more