When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in exploits, defenders might have hoped use of this tactic would decline. They were ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
Signing code is a critical process for maintaining software integrity and developer trust. On a Windows-based system, Authenticode signing provides assurance after a program or driver has been posted ...
File-based apps, extension members, nameof improvements, and user-defined compound assignment operators make life easier for C# programmers. You’ll need .NET 10.
By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
UnsolicitedBooker targets Central Asian telecoms with LuciDoor and MarsSnake, while PseudoSticky and Cloud Atlas hit Russia.
"Hi, Joy," a reader wrote. "My brother is not computer savvy but needs something to access the internet, mostly for research and online purchases. What have you found that is easy and not expensive?" ...
Hackers are hijacking email accounts and sending fake invites that install remote access tools. Even your antivirus may not ...
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack ...