Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
North Korean hacking group APT37 was seen deploying new implants, backdoors, and other tools in attacks targeting air-gapped ...
Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.
Batch scans of multiple suspicious files and tailored malware research for incident response: With the free tool vt-cli, VirusTotal follows your command.
There are moments in the evolution of a nation when a single incident, seemingly isolated, exposes a deeper and more troubling ...
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
Who is knocking at the Dohdoor? Digital intruders with possible links to North Korea have been infecting US education and healthcare sectors with a never-before-seen backdoor since at least December, ...
Explore how AI-driven behavioral heuristics and post-quantum security protect Model Context Protocol (MCP) deployments from advanced AI-age threats.
Use Windows Sandbox to safely install and test unknown apps in an isolated environment. Protect your PC from malware and ...