A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 ...
The modular Windows RAT uses in-memory execution and live operator control to maintain persistence and exfiltrate sensitive ...
China-linked Amaranth-Dragon and Mustang Panda target Southeast Asian governments using WinRAR exploit and PlugX phishing ...
ClickFix uses fake CAPTCHAs and a signed Microsoft App-V script to deploy Amatera stealer on enterprise Windows systems.
A new malicious campaign mixes the ClickFix method with fake CAPTCHA and a signed Microsoft Application Virtualization (App-V ...
Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.
Too slow react-ion time Baddies are exploiting a critical bug in React Native's Metro development server to deliver malware ...
Gaming on SteamOS has just been made much easier, thanks to a new Decky Loader plugin that fits multiple game libraries into one.
IntroductionIn September 2025, Zscaler ThreatLabz identified two campaigns, tracked as Gopher Strike and Sheet Attack, by a threat actor that operates in Pakistan and primarily targets entities in the ...
The Steam Deck is basically a full-fledged mini PC, which means it can do a lot, from installing custom plugins to emulating ...
Threat actors are exploiting the Metro4Shell React Native vulnerability to deploy malware on Linux and Windows systems.
With no-code workflows and streamlined data pipelines, Unity aims to simplify how firms build, share, and scale interactive ...