Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach reports, expert analysis, and actionable insights for infosec professionals and ...
In 1869, a group of Massachusetts reformers persuaded the state to try a simple idea: counting. The Second Industrial Revolution was belching its way through New England, teaching mill and factory ...
Electricians are getting harder to find, and some construction projects are on hold. Smartphones are expected to get pricier for potentially years to come. And promising innovations are being starved ...
MESA, Ariz.--(BUSINESS WIRE)--Iveda® (NASDAQ: IVDA), the global leader in AI video surveillance and smart city solutions, today announced the launch of its new Traffic Management Module within ...
RENO, Nev., February 4, 2026 — CIQ today announced that Network Security Services (NSS) for Rocky Linux from CIQ (RLC) 9.6 with post-quantum cryptography (PQC) algorithms has achieved Cryptographic ...
Travel management technology provider TripStax has added new AI capabilities to its Analytics module, including natural language generation and query features for users to access and understand their ...
On Friday, a Reddit-style social network called Moltbook reportedly crossed 32,000 registered AI agent users, creating what may be the largest-scale experiment in machine-to-machine social interaction ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results