This is a heavily interactive web application, and JavaScript is required. Simple HTML interfaces are possible, but that is not what this is.
Post
ThreatInsight
threatinsight.proofpoint.com
did:plc:5gwujgymmotfb4pszrxoblwb
Alongside this activity recently highlighted by Google (https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability), Proofpoint threat researchers have observed additional exploitation of WinRAR vulnerability CVE-2025-8088 by state‑aligned groups linked to China and the DPRK.
2026-01-28T21:34:33.761Z