play-mp3.ps1 Plays the given MP3 sound file. More » play-super-mario.ps1 Plays the Super Mario intro. More » play-tetris-melody.ps1 Plays the Tetris melody. More » speak-checklist.ps1 Speaks the given ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
A convincing lookalike of the popular Huorong Security antivirus has been used to deliver ValleyRAT, a sophisticated Remote Access Trojan (RAT) built on the Winos4.0 framework, to users who believed ...
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.
File and folder security is crucial in this day and age. There are apps you can use to heighten the security of your files. These apps are free and available for desktop and mobile devices. The need ...
Cloud storage security has become essential as more sensitive personal and business data moves online. While most providers encrypt data at rest and in transit using AES-256 and TLS 1.3, server-side ...
DroidLock ransomware locks Android screens and steals banking data through fake apps, turning phones into spy tools without encrypting files. Protect yourself by only downloading from the Google Play ...
When you need to quickly protect a sensitive file, encryption is your best defense. But on a work computer or a locked-down machine, installing new apps isn’t always an option. And trusting ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results