May 8, 2024, 12:43 p.m. | Tushar Subhra Dutta

Cyber Security News cybersecuritynews.com

Hackers exploit the weaponized shortcut files due to their ability to execute malicious code without knowing the user being targeted. Shortcut files are generally well-known and widely used, and due to this, they provide a good platform for deploying malware. The use of these harmless shortcuts is one of the best ways for hackers to […]


The post Hackers Using Weaponized Shortcut Files To Deploy CHM Malware appeared first on Cyber Security News.

chm code cyber-attack cyber security deploy exploit files good hackers hackers exploit malicious malware platform shortcut shortcuts well-known

More from cybersecuritynews.com / Cyber Security News

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC