GootLoader malware is abusing malformed ZIP archives that bypass common tools like WinRAR & deliver JavaScript payloads via ...
Once you go out of WinRAR and try something else, you would immediately notice how dated the tool has been. This realization hit me when I switched to a modern open-source alternative that made me ...
A security vulnerability in the WinRAR compression program, present until version 7.12 Beta 1, allows attackers to inject malicious code. Attacks exploiting this vulnerability have now been observed.
WinRAR Zero-Day Exploited by Russian-Linked Hackers RomCom and Paper Werewolf Your email has been sent Cybersecurity researchers have identified an actively exploited flaw in WinRAR that attackers are ...
WinRAR, that little app many of us installed years ago to “just open that one file”, has been compromised by hackers. This time, it’s not the usual “update available” situation. There’s a flaw so bad ...
Everyone's favorite file archiving utility isn't often in the news, but today is an exception. The WinRAR archiving utility has been the target of a couple of large-scale attacks that leverage a 0-day ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. There's something about the WinRAR stacked-book logo that makes me all nostalgic, giving me a ...
One incredibly popular Windows tools has recently been updated to address a zero-day exploit that could give bad actors a chance to install malware on devices running older versions of the app. The ...
A high-severity zero-day in the widely used WinRAR file compressor is under active exploitation by two Russian cybercrime groups. The attacks backdoor computers that open malicious archives attached ...
ESET found a high-severity bug in WinRAR being used by RomCom, a known Russian hacking collective The bug was being used to deploy backdoors allowing full access to compromised computers WinRAR says ...
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results