Windows 11 feeling bloated? Sophia Script lets you reshape the OS from the inside out. Here's how it works.
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
Microsoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
North Korean hacking group APT37 was seen deploying new implants, backdoors, and other tools in attacks targeting air-gapped ...
An OAuth feature is being abused in the wild to drop malware to people's computers.
PowerShell modules allow you to combine multiple scripts to simplify code management. Learn step-by-step instructions for creating and using these modules.
These four simple PowerShell scripts fix common Windows headaches and save time with quick, copy-and-paste commands.
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
CRESCENTHARVEST uses protest lures and malicious LNK files to deploy RAT malware targeting Iran protest supporters for espionage and data theft.
Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.