The modular Windows RAT uses in-memory execution and live operator control to maintain persistence and exfiltrate sensitive ...
DEAD#VAX campaign delivers AsyncRAT via IPFS-hosted VHD phishing files, using fileless memory injection and obfuscated ...
The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector.
North Korean Konni hackers are now targeting blockchain developers and engineers with AI-generated malware.
Attackers breached eScan antivirus update infrastructure to push malicious updates, deploying persistent malware on ...
A complex phishing campaign uses decentralized fake PDFs that mount virtual drives to silently install the AsyncRAT malware.
CrashFix crashes browsers to coerce users into executing commands that deploy a Python RAT, abusing finger.exe and portable Python to evade detection and persist on high‑value systems.
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
This is Part 2 of our two-part technical analysis on the Gopher Strike and Sheet Attack campaigns. For details on the Gopher Strike campaign, go to Part 1.IntroductionIn September 2025, Zscaler ...
Whenever something crazy happens in professional basketball, some fans bring up the idea of the NBA script. The implication is that the final outcome of certain events are predetermined by the league ...