Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to ...
Unwitting victims are now being tricked into installing malware via Windows Terminal, but some experts say this is old news.
Microsoft reveals ClickFix campaign abusing Windows Terminal to deliver Lumma Stealer and steal browser credentials.
Master the step-by-step process to remove Microsoft Edge via PowerShell on Windows 10. Free up RAM, CPU, and storage for epic ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal ...
Abstract: Fileless malware predominantly relies on PowerShell scripts, leveraging the native capabilities of Windows systems to execute stealthy attacks that leave no traces on the victim's system.
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
The Sophia Script is an open-source PowerShell module designed to debloat and fine-tune Windows 11 (and Windows 10). It is ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, ...
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
PowerShell can do far more than most users realize. Explore 10 hidden capabilities that save time, improve reporting, and ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...