North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow.
Former match fixer Moses Swaibu aims to help other athletes avoid the same perils with his platform offering a player-focused approach.
Multiplier tasks involve activities humans can already perform but accelerate with AI, such as summarization or translation. Enabler tasks allow previously inaccessible creative production, such as ...
Five extensions were doing all sorts of malicious acts, including stealing payment data.
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET ...
As artificial intelligence (AI) continues to revolutionize every industry worldwide, it is also being actively exploited in cybercrimes such as hacking or becoming a target of attacks itself.
Finding the right book can make a big difference, especially when you’re just starting out or trying to get better. We’ve ...
The survey highlights a glaring rift between the public and law enforcement. In Mexicali, the Municipal Police hold the lowest approval rating, with only 39.6% of the population expressing confidence ...
A fake Go module posing as golang.org/x/crypto captures terminal passwords, installs SSH persistence, and delivers the ...