North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
A Chrome extension named "QuickLens - Search Screen with Google Lens" has been removed from the Chrome Web Store after it was ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...
Your SSD may be hiding errors, and you won't know until it's too late ...
The silent data corruption problem that can destroy your files ...
Microsoft details a new ClickFix variant abusing DNS nslookup commands to stage malware, enabling stealthy payload delivery ...
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.
Microsoft has issued a new optional preview update for Windows 11, giving users an early look at improvements expected to ...
Unix permissions control who can read, write or execute a file. You can limit it to the owner of the file, the group that owns it or the entire world. For security reasons, files and directories ...
A bad actor used AI tools to compromise more than 600 FortiGate appliances around the world in five weeks, Amazon says, the latest example of how hackers are increasing are using the technology to ...