A previously undocumented state-backed threat actor named GopherWhisper is using a Go-based custom toolkit and legitimate ...
A ClickFix campaign targeting macOS users delivers an AppleScript-based infostealer that collects credentials and live ...
A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an ...
PHANTOMPULSE spreads via Obsidian plugin abuse in REF6598 campaign, targeting finance and crypto users, bypassing AV controls ...
Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up ...
FreeBSD, Haiku, and other systems everyone mistakes for Linux are actually their own OS outside of the system that you are ...
IntroductionOn March 12, 2026, Zscaler ThreatLabz discovered a malicious ZIP archive containing military-themed document lures targeting Chinese-speaking individuals. Our analysis of this sample ...
GlassWorm malware uses a Zig-based dropper to infect developer tools, stealing data and spreading across IDEs.
Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation ...
Got an ancient laptop or desktop lying around? Here's how to transform an old PC into an NAS, experiment with a new OS, build ...
The devs were quick to remove the malware, as millions of users rely on these to track temperatures, voltages, fan speeds, ...
GlassWorm uses a fake WakaTime VS Code extension to infect IDEs, deploy RATs, and steal data, prompting urgent credential ...