News

The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach corporate networks. Here's how to block malicious OneNote phishing ...
ZIP and RAR files have overtaken Office documents as the file most commonly used by cyber criminals to deliver malware, according to an analysis of real-world cyber attacks and data collected from ...
Google researchers spotted malware developers creating malformed code signatures seen as valid in Windows to bypass security software. This tactic is actively used to push OpenSUpdater, a family of ...