Malware continues to evolve, becoming more sophisticated and harder to detect. One of the most challenging types is polymorphic malware — malicious software that constantly changes its code to evade ...
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Why encrypted backups may fail in an AI-driven ransomware era ...
Four rogue NuGet packages and one npm package stole ASP.NET Identity data, deployed C2 backdoors, and reached over 50,000 ...
Endor Labs launches AURI, a free security platform that embeds directly into AI coding assistants like Cursor and Claude to ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Batch scans of multiple suspicious files and tailored malware research for incident response: With the free tool vt-cli, ...
This is how intelligent, responsible business owners approve bad payments. Urgency pushes you to resolve quickly, familiarity ...
In sharp contrast with its approach to privacy, Windows 11 security is in a good place, with no major enshittification issues ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results