A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users ...
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
Preventing of the consequence of cracked or pirated software focuses on user awareness training to recognize the threat.
Hackers are impersonating IT staff in Microsoft Teams to trick employees into installing malware, giving attackers stealthy ...
A tampered copy of FileZilla quietly contacts attacker-controlled servers using encrypted DNS traffic that can slip past ...
TrustConnect is back, this time used to deploy legitimate but weaponized RMM solutions.
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that ...
The open-source app store GitHub-Store has been released in version 1.6.0. It brings better Linux support and many ...
Cybercriminals are now able to rent Malware-as-a-service and legally install malware on your PC. Learn how to identify these ...