A full-sized Trojan horse![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf08a889766c78026/668476716b429c0f7f8ac4e2/Trojan_horse-Images_&_Stories-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)
Application Security![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf08a889766c78026/668476716b429c0f7f8ac4e2/Trojan_horse-Images_&_Stories-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)
Software Productivity Tools Hijacked to Deliver InfostealersSoftware Productivity Tools Hijacked to Deliver Infostealers
Innocuous little Windows programs were carrying cheap malware for weeks, exposing customers of the India-based software vendor to data theft.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.