IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
APT28 exploited CVE-2026-21513, an MSHTML zero-day (CVSS 8.8), using malicious LNK files to bypass security controls and ...
Cofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and ...
Two dozen journalists. A pile of pages that would reach the top of the Empire State Building. And an effort to find the next revelation in a sprawling case. Interview by Patrick Healy With Steve ...
Infrastructure delivering updates for Notepad++—a widely used text editor for Windows—was compromised for six months by suspected China-state hackers who used their control to deliver backdoored ...
Federal prosecutors had identified 6 million files that were ‘potentially responsive’ to the law, but only released 3.5. Why? The justice department released a trove of 3.5m files related to the dead ...
Un-redacted text from released documents began circulating on social media on Monday evening People examining documents released by the Department of Justice in the Jeffrey Epstein case discovered ...
The House on Wednesday formally sent the Epstein bill to the Senate, the final procedural move before the legislation can be sent to President Trump for his signature. After the House passed the ...
When opening a file downloaded from the internet in Word, you may have noticed it is opening in Protected View. While the feature reduces risks, it can also disable macros and other useful content. We ...
All products featured here are independently selected by our editors and writers. If you buy something through links on our site, Mashable may earn an affiliate commission. Kindles used to only ...