A third-party patch management company is cutting short attackers’ use of LNK files to smuggle in malicious commands, while ...
The flaw, tracked as CVE-2025-9491, allowed cybercriminals to hide malicious commands from users inspecting files through ...
The LNK vulnerability was used to launch remote code execution in cyber-espionage, data theft, and fraud attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results