IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
Microsoft warns of a campaign on chat platforms where attackers slip malware to victims as supposed gaming tools.
Michael Boyle is an experienced financial professional with more than 10 years working with financial planning, derivatives, equities, fixed income, project management, and analytics. Yarilet Perez is ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.
Michael Boyle is an experienced financial professional with more than 10 years working with financial planning, derivatives, equities, fixed income, project management, and analytics. Vikki Velasquez ...
Security teams are rarely short of technology. What they lack is capacity. Time to investigate properly. Headroom to think clearly when an alert lands at 02:00. Enough experienced analysts to […] ...
Claude Code is the new AI coding assistant that many users are using in their workflows. Here's everything you need to know ...
As Chief Information Security Officers (CISOs) and security leaders, you are tasked with safeguarding your organization in an ...
Don’t start with moon shots. by Thomas H. Davenport and Rajeev Ronanki In 2013, the MD Anderson Cancer Center launched a “moon shot” project: diagnose and recommend treatment plans for certain forms ...