Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Hosted on MSN
PowerShell: Everything you need to know
PowerShell can be an information technology (IT) admin’s best friend if they know how to use it properly. Created by Microsoft over a decade ago, this object-oriented automation engine allows IT ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack ...
A modern Task Scheduler for Windows 11 exists now, and honestly Microsoft should be embarrassed. Plus, it's free.
Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and ...
A notorious Russian military cyberespionage hacking group has been refining its malware to conduct long-term surveillance of targets in Ukraine and beyond. See Also: Experts Offer Insights from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results