Windows exploit

Attackers abuse Chrome to deliver malware as “legit” app

Attackers abuse Chrome with a very dangerous malicious software. It can access sensitive information and bypass Windows security features, such…

2 years ago

Villains used Windows Background ITS for Ryuk attacks

Attackers use Windows Background Intelligent Transfer Service (BITS) to implement malicious payloads on Windows computers. Of course, they do this…

3 years ago

Cryptocurrency miner delivered by exploiting the BlueKeep vulnerability

The BlueKeep (Windows Remote Desktop Services) vulnerability was exploited by attackers to deliver cryptocurrency mining malware. Researchers say that BlueKeep,…

4 years ago