News
A security vulnerability in WinRAR allows malicious code to be executed. It is already under attack in the wild.
The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited zero-day ...
ESET researchers Anton Cherepanov, Peter Košinár and Peter Strýček identified the vulnerability. According to ESET expert ...
20h
Tom's Hardware on MSNNewly discovered WinRAR exploit linked to Russian hacking group, can plant backdoor malware — zero day hack requires manual update to fixA new vulnerability in file archiving software WinRAR has come to light that can potentially install backdoor malware on ...
2d
PCMag on MSNPatch Now: New WinRAR Flaw Used to Deliver MalwareESET discovers a Russian hacking group exploiting the vulnerability to deliver malware through phishing emails. WinRAR ...
Once a malicious file is placed in these folders, it can install malware or open a hidden backdoor without any further action from the user.
Ever since Windows 11 started supporting the RAR archive format, there has been little reason to download – or buy – WinRAR ...
A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the ...
Security researchers have revealed that WinRAR has been actively exploited since April of this year, but there's good news. RARLAB has released a fix, and it's critically important that all WinRAR ...
Both issues were fixed with release 6.23, so if you still have a WinRAR install kicking around, make sure it’s up to date! Panic at the DNS Disco Captive portals are a security problem. Apparently.
WinRAR is a popular file-archiving utility for Windows, which can create and allow viewing of archives in Roshal Archive Compressed (RAR) or ZIP file formats, and unpack numerous archive file formats.
Last month, a 19-year-old bug was discovered in WinRAR, a software used to extract .zip and other file archives on your Windows PC. The company was quick to patch the bug, but users who haven't ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results