New hacking cluster exploits web servers and Mimikatz to infiltrate Asian infrastructure for long-term espionage in aviation, ...
An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows ...
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users ...
Malicious AI browser extensions collected LLM chat histories and browsing data from platforms such as ChatGPT and DeepSeek.
APsystems inverters communicate with the manufacturer's cloud systems. A vulnerability allowed firmware smuggling.
The Rust reimplementation of classic Unix tools reaches version 0.7 with numerous performance improvements and build fixes ...
Hackers have launched a convincing, fraudulent CleanMyMac website to trick Mac users into installing SHub Stealer, a malware ...
AI is helping cybercriminals to rapidly assemble malware with flat-pack efficiency. It’s almost like buying a sofa from Ikea, ...
Source Code Exfiltration in Google AntigravityTL;DR: We explored a known issue in Google Antigravity where attackers can ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Recent advances in bioanalytical sciences and bioengineering have led to the development of DNA chips 1,2, miniaturized biosensors 3,4, and microfluidic devices (e.g., microelectromechanical systems ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results