The shift to remote work has transformed how organizations manage access to their digital resources. Identity Access ...
Threat actors are abusing the QEMU machine emulator to hide their malicious activity within virtualized environments.
Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used ...
Researchers say a prompt injection bug in Google's Antigravity AI coding tool could have let attackers run commands, despite ...
Microsoft is warning of threat actors increasingly abusing external Microsoft Teams collaboration and relying on legitimate ...
The collaboration platform is being abused by hackers pretending to be IT support.
UNC6692 has been attributed to a large email campaign that's designed to overwhelm a target's inbox with a flood of spam ...
A growing range of native macOS features are being repurposed by attackers to execute code, move laterally and evade ...
A prompt injection flaw in Google’s Antigravity IDE turns a file search tool into a remote code execution vector, bypassing ...
Popular tool abuse, ClickFix, and identity-based attacks are among the most prevalent techniques bad actors are deploying ...
Monday cybersecurity recap on evolving threats, trusted tool abuse, stealthy in-memory attacks, and shifting access patterns.
IntroductionOn March 12, 2026, Zscaler ThreatLabz discovered a malicious ZIP archive containing military-themed document lures targeting Chinese-speaking individuals. Our analysis of this sample ...