Zip Slip, Path Traversal Vulnerability during File Decompression

Zip Slip, Path Traversal Vulnerability during File Decompression

Overview Path traversal or directory traversal vulnerabilities are security vulnerabilities that occur mainly due to improper validation of user inputs. Attackers can read, modify, or even create new files that are originally inaccessible or located in unintended paths using relative or absolute paths. Although these vulnerabilities have been known for

RARLAB Product Security Update Advisory (CVE-2025-8088)

RARLAB Product Security Update Advisory (CVE-2025-8088)

Overview   We have released a security update to fix vulnerabilities in our RARLAB products. Users of affected products are advised to update to the latest version.    Affected Products   CVE-2025-8088   WinRAR (WIndows) Version: 7.12 and earlier     Resolved Vulnerabilities   Path traversal vulnerability in WinRAR in

WinRAR Security Update Advisory (CVE-2025-6218)

WinRAR Security Update Advisory (CVE-2025-6218)

Overview   We have released a security update to address a vulnerability in WinRAR. Users of affected products are advised to update to the latest version.    Affected Products   CVE-2025-6218   WinRAR Versions: below 7.12     Resolved Vulnerabilities   Path traversal vulnerability in WinRAR (CVE-2025-6218)     Vulnerability

Detecting Akira Ransomware Attack Using AhnLab EDR

Detecting Akira Ransomware Attack Using AhnLab EDR

Akira is a relatively new ransomware threat actor that has been active since March 2023. Like other ransomware threat actors, they breach organizations and not only encrypt their files but also exfiltrate sensitive information to use in negotiations. As shown in the following 2024 statistics, the number of companies affected

Play Ransomware Attack Cases Detected by AhnLab EDR

Play Ransomware Attack Cases Detected by AhnLab EDR

Play ransomware, also known as Balloonfly or PlayCrypt, was first identified in June 2022 and has reportedly attacked over 300 organizations worldwide since then. A notable characteristic of the ransomware, which remains actively in use, is its addition of the “.PLAY” extension to files following encryption. Like other ransomware threat