Crypto criminals are refining social engineering tactics to bypass traditional security tools, using fake venture capital outreach to deploy a technique known as ClickFix.
The jury never sees him. The defendant never sees him. But the child does. Meet Klancey, the facility dog quietly helping ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack ...
Kometa automates Plex library management by dynamically rebuilding collections and enforcing consistent metadata and artwork.
The now-patched flaw is the latest in a growing string of security issues with the viral AI tool, which has seen rapid adoption among developers.
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.