Attackers are exploiting trust in Adobe’s brand to deliver covert remote access, using a fake Acrobat Reader download page to install ConnectWise ScreenConnect through a fileless, memory-heavy attack ...
The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
A series of malicious LNK files targeting users in South Korea has been detected using a multi-stage attack chain that uses GitHub as command and control (C2) infrastructure.
In January 2026, Microsoft Defender Experts identified a new evolution in the ongoing ClickFix campaign. This updated tactic deliberately crashes victims’ browsers and then attempts to lure users into ...
I’ve built a collection of PowerShell scripts for managing, reporting, and auditing Microsoft 365 environments (BETA). - Ryan-Adams57/Microsoft-365-PowerShell-Scripts ...
This repository contains PowerShell scripts and documentation to help detect whether Windows endpoints may be affected by the Shai-Hulud / Sha1-Hulud npm supply-chain campaign. The goal is to answer ...
A PowerShell script using WBAdmin can create full system backups of Windows 11, offering a simple, scriptable alternative for advanced users. Over the last couple of years, I have written a few blog ...
I’ve always believed that computers should work for us, not the other way around. This was until I found myself spending countless hours on mindless tasks. This was until I started using artificial ...