Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users ...
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows ...
This is a guide to using access codes for locked doors, supply drops, and getting into Pinwheel on the Outpost map in Marathon.
We found fake “verify you are human” pages on hacked WordPress sites that trick Windows users into installing the Vidar ...
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers.
New ClickFix variant maps WebDAV drive to run trojanized WorkFlowy app, enabling stealth C2 beacon and payload delivery.
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
In recent months, Microsoft Threat Intelligence identified email campaigns using lures around W-2, tax forms, or similar ...
Fix OneNote can't connect to the server, Sync will resume once we connect. You don't need to take any action. (0x803D0014 ...
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
Stop Googling. The answer is staring you right in the face—you just have to read it.
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that ...