APT28’s Operation MacroMaze used macro-laced documents and webhook.site to exfiltrate data across Europe from Sept 2025 to ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
It’s hard to overstate the role that Wi-Fi plays in virtually every facet of life. The organization that shepherds the wireless protocol says that more than 48 billion Wi-Fi-enabled devices have ...
The Defense Department used a high-energy laser to shoot down a drone belonging to the Department of Homeland Security over a small border town near El Paso Thursday, prompting the Federal Aviation ...
Sometimes, all that's needed to track you is your ghost.
Experiential marketing is one of the industry’s most demanding disciplines, where spectacle alone rarely holds attention for long. The experiential campaigns recognized at The Drum Awards demonstrate ...
OpenClaw, an open-source AI assistant, acts, learns and sometimes goes off the script. Experts caution that while agentic AI feels magical, it is dangerous.
In November 2025, somewhere between Marrakech and the At­las Mountains, an Austrian pro­grammer spent an hour wiring together two pieces of software that would, within weeks, fun­damentally alter the ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
Turning terminal noise into usable, readable data.