Say goodbye to repetitive tasks forever with this surprising Windows feature.
Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
Researchers uncover APT28-linked phishing attacks against Ukrainian targets deploying BadPaw loader and MeowMeow backdoor for remote system control.
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
North Korean hacking group APT37 was seen deploying new implants, backdoors, and other tools in attacks targeting air-gapped ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
Microsoft warns of a campaign on chat platforms where attackers slip malware to victims as supposed gaming tools.
AttackIQ has released a new attack graph that emulates the behaviors exhibited by BlackByte ransomware, a strain operated ...
Dormant access refers to any account or entitlement that keeps its privileges but shows no sign of use for an extended period. This can be a domain admin ...
Discover the 7 best cloud orchestration tools for enterprises in 2026, including AWS CloudFormation, Ansible, Spacelift, CloudBolt, and more. Compare features, pricing, multi-cloud support, and use ...
OpenAI launches its native Codex app for Windows, tailored for agentic coding with PowerShell integration and robust ...