A newly discovered InstallFix campaign relies on malicious commands on cloned installation webpages to trick victims into installing malware.
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows ...
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users ...
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows Terminal.
AI-generated Slopoly malware used by Hive0163 in 2026 attacks maintained access for over a week, highlighting how AI ...
Unwitting victims are now being tricked into installing malware via Windows Terminal, but some experts say this is old news.
A developer’s routine cleanup task reportedly turned into a disaster after a small mistake in AI-generated code wiped an entire drive. The incident, first described in a Reddit post, involved code ...
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
Quick and efficient command-line alternatives to everyday GUI tasks.
China-linked CL-STA-1087 targets Southeast Asian militaries since 2020 using AppleChris and MemFun for espionage and ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...