CrashFix crashes browsers to coerce users into executing commands that deploy a Python RAT, abusing finger.exe and portable Python to evade detection and persist on high‑value systems.
A new malicious campaign mixes the ClickFix method with fake CAPTCHA and a signed Microsoft Application Virtualization (App-V ...
ClickFix uses fake CAPTCHAs and a signed Microsoft App-V script to deploy Amatera stealer on enterprise Windows systems.
DEAD#VAX campaign delivers AsyncRAT via IPFS-hosted VHD phishing files, using fileless memory injection and obfuscated ...
Launch multiple apps at once, clear temporary files, and more.
Get your fresh install settled quickly with these 4 PowerShell scripts ...
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
After Microsoft, Google, and a long fight for automation, Jeffrey Snover hangs up his keyboard A really important window is ...
Two malware campaigns weaponize open-source software to target executives and cloud systems, combining social engineering ...
The modular Windows RAT uses in-memory execution and live operator control to maintain persistence and exfiltrate sensitive ...
This is Part 2 of our two-part technical analysis on the Gopher Strike and Sheet Attack campaigns. For details on the Gopher Strike campaign, go to Part 1.IntroductionIn September 2025, Zscaler ...
A malicious ad-blocking extension on Chrome and Edge known as NexShield is using the ClickFix attack to infect devices with a ...