North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
PowerShell can do far more than most users realize. Explore 10 hidden capabilities that save time, improve reporting, and supercharge your workflow.
The newest Windows 11 preview builds for Dev and Beta Channels are here with enhanced shared audio, improved batch file security, and more.
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
The first of the three flaws involved abusing Claude's Hooks feature to achieve remote code execution. Hooks are user-defined shell commands that execute at various points in the tool's lifecycle, ...
If you’ve ever done Linux memory forensics, you know the frustration: without debug symbols that match the exact kernel version, you’re stuck. These symbols aren’t typically installed on production ...
Romance scams are becoming more sinister as organized fraud factories overseas target U.S. bank accounts. Learn how these ...
Bulky, assorted files filling up my Downloads folder are no more.
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.
While software can sync files and folders for you, it's often limited in scope. Learn how a PowerShell script can help you build a custom solution.