New hacking cluster exploits web servers and Mimikatz to infiltrate Asian infrastructure for long-term espionage in aviation, energy, and govt sectors ...
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users ...
Malicious AI browser extensions collected LLM chat histories and browsing data from platforms such as ChatGPT and DeepSeek.
APsystems inverters communicate with the manufacturer's cloud systems. A vulnerability allowed firmware smuggling.
AI is helping cybercriminals to rapidly assemble malware with flat-pack efficiency. It’s almost like buying a sofa from Ikea, ...
Hackers have launched a convincing, fraudulent CleanMyMac website to trick Mac users into installing SHub Stealer, a malware ...
Source Code Exfiltration in Google Antigravity‍TL;DR: We explored a known issue in Google Antigravity where attackers can ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Recent advances in bioanalytical sciences and bioengineering have led to the development of DNA chips 1,2, miniaturized biosensors 3,4, and microfluidic devices (e.g., microelectromechanical systems ...