Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve ...
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four ...
The China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to ...
New PoC shows how Microsoft Defender can be tricked into rewriting malicious files into protected locations, enabling ...
Now a security researcher says a Reader hole has been quietly exploited by malware for as long as four months, fingerprinting ...
The devs were quick to remove the malware, as millions of users rely on these to track temperatures, voltages, fan speeds, ...
Links to multiple CPUID tools hijacked and used to drop an infostealer.
The CPUID website was compromised, leading to popular Windows utilities such as CPU-Z and HWMonitor delivering multi-stage, ...
Supported Releases: These releases have been certified by Bloomberg’s Enterprise Products team for use by Bloomberg customers. Experimental Releases: These releases have not yet been certified for use ...
A convincing Microsoft lookalike tricks users into downloading malware that steals passwords, payments, and account access.
The CPUID website for system analysis tools CPU-Z and HWMonitor was manipulated by attackers. It distributed malware.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results