VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe ...
If your PC struggles to handle modern software, you'll fare much better with these lighterweight alternatives.
Over the course of nearly 300 posts, Jonathan Bennett set a very high bar for this column, so we knew it needed to be placed in the hands of somebody who could do it justice.
Microsoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Channel Sounding, for example, lets Bluetooth devices like trackers and smart locks find each other more easily and ...
To become PCI compliant, companies must meet the 12 key requirements, which are split up into roughly 300 sub-requirements for firewalls, unique passwords, physical and virtual measures to avoid data ...
Why encrypted backups may fail in an AI-driven ransomware era ...
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...