Exploits

A week in security (February 23

Last week on Malwarebytes Labs: Public Google API keys can be used to expose Gemini AI data Inside a fake Google security check that becomes a...

Fake Zoom Update Scam Infects 1,437 Users, Deploys Surveillance Malware In Just 12 Days

A sophisticated phishing campaign has infected 1,437 Windows users in just 12 days by abusing trust in Zoom updates. Instead of 

RAT Malware Via Windows Explorer Puts Crypto at Risk

Cofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and push RATs to corporate targets. Threat actors...

Week in review: Self-spreading npm malware hits developers, Cisco SD-WAN 0-day exploited since 2023

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Identity verification systems are struggling with synthetic fraudFake and expired...

ScarCruft Exploits Zoho WorkDrive and USB Malware to Compromise Air-Gapped Government and Defense Networks

top of page Book A Demo Yes, subscribe me to your newsletter. Rescana harnesses agentic AI to simplify third-party and external risk management, putting defenders firmly in...

APT37’s Ruby Jumper Malware Targets Air-Gapped Windows Networks with USB-Based Attacks

top of page Book A Demo Yes, subscribe me to your newsletter. Rescana harnesses agentic AI to simplify third-party and external risk management, putting defenders firmly in...

I smell a RAT — new Android malware can hack every top phone maker’s security, and costs less than a second-hand iPhone

(Image credit: ozrimoz / Shutterstock) Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Subscribe to our newsletter Oblivion can intercept SMS,...

Hackers Abuse Windows File Explorer and WebDAV for Stealthy Malware Delivery

Cybercriminals are increasingly abusing a legacy feature within Windows File Explorer to distribute malware. 

Microsoft warns of RAT delivered through trojanized gaming utilities

Pierluigi Paganini February 28, 2026 Threat actors are tricking users into running trojanized gaming utilities shared through browsers and chat platforms to deploy a...

Latest articles