A precise approach to everyday Windows breakdowns.
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, ...
North Korean hacking group APT37 was seen deploying new implants, backdoors, and other tools in attacks targeting air-gapped ...
Cybersecurity researchers identify five active threat groups using phishing, malware and influence tactics as cyber activity ...
Threat groups are weaponizing industrial control access they’ve gained over the years, but critical infrastructure operators ...
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal ...
China linked APT41 hackers deploy Silver Dragon campaign targeting organizations with malware and espionage tactics.
Microsoft rolls out Windows 11 Insider builds featuring a built-in network speed test, Emoji 16.0, shared audio controls, and ...