PowerShell can do far more than most users realize. Explore 10 hidden capabilities that save time, improve reporting, and supercharge your workflow.
There are several tools you can use to "debloat" Windows 11, which says a lot about how unpopular many of Microsoft's built-in extras have become, particularly Copilot and other AI-driven features.
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
Malicious Chrome extensions tied to ownership transfers push malware and steal data, exposing thousands to credential theft ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub ...
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...
Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks.
An AI-assisted hacker campaign breached over 600 FortiGate firewalls worldwide by exploiting weak credentials and public interfaces in a chilling demonstration of how generative AI ...
The big VMware Exit continues and will continue over the next few years. With the ongoing shifts in the virtualization market ...