Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
An OAuth feature is being abused in the wild to drop malware to people's computers.
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Malicious Packagist Laravel packages install a cross-platform RAT enabling remote shell access and system reconnaissance via ...
Claude Code is the new AI coding assistant that many users are using in their workflows. Here's everything you need to know ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Microsoft Copilot’s Google Contacts connector is now live. We tested it on Copilot web and Android app and compared it with ...
Windows 11 LTSC is a clean, bloatware-free OS without Copilot, AI, ads, or feature updates. Here’s how LTSC performs vs ...
Our two top picks for pain-free tax prep in 2026 face off on ease of use, coverage, support, mobile apps, and more. I write about money. I’ve been reviewing tax software and services as a freelancer ...
As Chief Information Security Officers (CISOs) and security leaders, you are tasked with safeguarding your organization in an ...