An award is expected within 10 days for a mission command system to link disparate counter-drone systems into a single user interface, the ...
A massive cyberattack during strikes on Iran highlights digital warfare's growing role in modern conflict, offering ...
An OAuth feature is being abused in the wild to drop malware to people's computers.
Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Google says it disrupted what it believes was the world's largest residential proxy network that hijacked about 9 million ...
Fake IT support calls delivered Havoc C2, enabling credential theft, lateral movement, and ransomware prep across five ...
SCHOFIELD BARRACKS, Hawaii –25th Infantry Division Soldiers concluded Lightning Surge 2 Friday, Feb. 27, a week-long event ...
Operational penetration testing is a process of simulating real-world attacks on OT systems to identify vulnerabilities before cybercriminals can exploit them, either physically or remotely. OT ...
Microsoft uncovers OAuth phishing campaigns that abuse login redirects to deliver malware and steal credentials.
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
Strategic success abroad does not automatically translate into safety at home. Iran may seek cyber revenge on the U.S.