I found the easiest way to encrypt files on an Android phone - and it's free to do ...
A relatively new ransomware family is using a novel approach to hype the strength of the encryption used to scramble ...
Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised ...
A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant ...
Stop risking your PC. Use Windows 11's built-in virtualization tools to test virtually anything safely in a fully isolated ...
A new Linux GoGra backdoor abuses Outlook via Microsoft Graph API for stealthy C2, targeting telecom, government, and IT sectors.
GopherWhisper infected 12 Mongolian government systems in January 2025, abusing Slack and Discord for C2, exposing wider ...
When evolutionary biologist Joseph Popp coded the first documented piece of ransomware in 1989, he had little idea it would ...
Two newly discovered macOS threats are designed to harvest developer credentials and cloud access as attackers focus on ...
Learn how to secure MCP deployments with cryptographically agile policies and quantum-resistant encryption to protect AI infrastructure from advanced threats.
IntroductionOn March 12, 2026, Zscaler ThreatLabz discovered a malicious ZIP archive containing military-themed document ...
Unsafe defaults in MCP configurations open servers to possible remote code execution, according to security researchers who ...