Ransomware actors are ditching Cobalt Strike in favor of native Windows tools, as payment rates hit record lows and data ...
VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
China-linked CL-STA-1087 targets Southeast Asian militaries since 2020 using AppleChris and MemFun for espionage and ...
Something else to worry about.
Illegally downloading the latest Oscar contender might feel like beating the system. But when the malware kicks in, as ...
Tony Anscombe, chief security evangelist at ESET, returns to the podcast for a wide-ranging conversation about the cybersecurity landscape in early 2026. From the emergence of AI-powered malware to ...
A recent malware campaign is using a trusted Windows application to launch attacks for stealing credentials via social engineering with the exploitation of the Windows Terminal with the use of Lumma ...
The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a ...
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows ...
The state-sponsored hackers deployed custom tools and stayed dormant in the compromised environments for months.