IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
North Korean hacking group APT37 was seen deploying new implants, backdoors, and other tools in attacks targeting air-gapped ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
Fake CAPTCHA attacks exploded by 563% last year: How to spot them and stay safe online ...
Removing these AI features from Windows isn't as hard as you may think.
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...
I’m a traditional software engineer. Join me for the first in a series of articles chronicling my hands-on journey into AI ...
Dormant access refers to any account or entitlement that keeps its privileges but shows no sign of use for an extended period. This can be a domain admin ...
PowerShell can do far more than most users realize. Explore 10 hidden capabilities that save time, improve reporting, and supercharge your workflow.
Microsoft is gearing up for big PowerShell and Windows OpenSSH changes in 2026, but security will come before flashy new features. Although Microsoft has already vowed to work on Windows 11 pain ...