IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
A convincing lookalike of the popular Huorong Security antivirus has been used to deliver ValleyRAT, a sophisticated Remote Access Trojan (RAT) built on the Winos4.0 framework, to users who believed ...
Human language may seem messy and inefficient compared to the ultra-compact strings of ones and zeros used by computers—but our brains actually prefer it that way. New research reveals that while ...
What appears to be a cryptic puzzle could actually be traced back to a peculiar technical glitch.
You should treat any unexpected package with caution, even if it looks innocent. Dangerous substances and malicious content increasingly come disguised in candy bags, toy boxes, souvenir items, and ...
– Designation recognizes the potential of ETX101 to address a serious condition with high unmet need – Encoded Therapeutics, Inc. (“Encoded”), a clinical-stage biotechnology company developing ...
needs-example-codeThe issue needs a minimal and complete (e.g. all imports) example showing the problemThe issue needs a minimal and complete (e.g. all imports) example showing the problem The text ...
On 29 August 2025, Huntress analysts encountered a previously unseen ransomware variant called “Obscura.” This name was taken from the ransom note (README_Obscura.txt), which also made several ...
A deserialization of untrusted data in the MOM software allows attackers to achieve remote code execution. Threat actors are exploiting a critical-severity vulnerability in DELMIA Apriso factory ...
A new phishing campaign leveraging SVG files to deliver JavaScript-based redirect attacks has been uncovered by cybersecurity researchers. The attack utilizes seemingly benign image files to conceal ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results