How-To Geek on MSN
Stop trusting your single drive: How to use PAR2 and hash manifests to defeat silent bit rot
If your PC is your only backup, at least make it corruption-proof—here's how ...
For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.
Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
Unwitting victims are now being tricked into installing malware via Windows Terminal, but some experts say this is old news.
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and ...
Microsoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware ...
China linked APT41 hackers deploy Silver Dragon campaign targeting organizations with malware and espionage tactics.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results