Researchers uncover APT28-linked phishing attacks against Ukrainian targets deploying BadPaw loader and MeowMeow backdoor for remote system control.
While some of the campaigns have been found to leverage the technique to deliver malware, others send users to pages hosted on phishing frameworks such as EvilProxy, which act as an ...
Threat groups are weaponizing industrial control access they’ve gained over the years, but critical infrastructure operators ...
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
China linked APT41 hackers deploy Silver Dragon campaign targeting organizations with malware and espionage tactics.
While software can sync files and folders for you, it's often limited in scope. Learn how a PowerShell script can help you build a custom solution.
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
An OAuth feature is being abused in the wild to drop malware to people's computers.
Microsoft confirms a wider rollout of Windows 11's new colourful battery icons on the taskbar. New Start menu is also rolling out.
This week, Cisco patches and hacks. Trojanized app targeted Israelis. Bye-bye, Tycoon 2FA. Also bye-bye LeakBase. A LexisNexis breach. Woman sentenced for ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
Attackers are running paid Facebook ads that look like official Microsoft promotions, then directing users to near-perfect clones of the Windows 11 download page. Click Download Now and instead of a ...