{
	"id": "d724e89a-65aa-4f3a-9d49-52200c014c47",
	"created_at": "2026-04-06T01:29:25.121967Z",
	"updated_at": "2026-04-10T03:20:54.486099Z",
	"deleted_at": null,
	"sha1_hash": "46a831fcc988f099e004cc7129b936c953aa04cd",
	"title": "Blogs | Zscaler",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 45978,
	"plain_text": "Blogs | Zscaler\r\nBy Deepen Desai\r\nArchived: 2026-04-06 01:11:14 UTC\r\nHome\r\nHome\r\nZscaler Blog\r\nGet the latest Zscaler blog updates in your inbox\r\nAI/ML\r\nAccelerate M\u0026A and Divestitures\r\nAnalyst\r\nApplication Transformation\r\nBuild \u0026 Run Secure Cloud Apps\r\nCareers\r\nCustomer Success Story\r\nData Security\r\nLatest\r\nOldest\r\nA-Z\r\nZ-A\r\nDigital supply chain representation.\r\nSecurity Research\r\nThreat Research\r\nSupply Chain Attacks Surge in March 2026\r\nRead now\r\nhttp://research.zscaler.com/2015/08/chinese-cyber-espionage-apt-group.html\r\nPage 1 of 4\n\nPhoto ThreatLabz\r\nThreatLabz\r\nApril 03, 2026 | 7 min read\r\nClaude Code logo atop a digital background.\r\nSecurity Research\r\nThreat Research\r\nAnthropic Claude Code Leak\r\nRead now\r\nPhoto Manisha Ramcharan Prajapati\r\nManisha Ramcharan Prajapati\r\nApril 01, 2026 | 6 min read\r\nA person typing at their computer\r\nSecurity Research\r\nThreat Research\r\nLatest Xloader Obfuscation Methods and Network Protocol\r\nRead now\r\nPhoto ThreatLabz\r\nThreatLabz\r\nMarch 31, 2026 | 12 min read\r\nA digital wall with binary code. The word \"FIREWALL\" glowing.\r\nSecurity Research\r\nThreat Research\r\nCritical Remote Code Execution Vulnerability in Cisco Secure Firewall Management Center (CVE-2026-20131)\r\nRead now\r\nPhoto Sakshi Aggarwal\r\nSakshi Aggarwal\r\nhttp://research.zscaler.com/2015/08/chinese-cyber-espionage-apt-group.html\r\nPage 2 of 4\n\nMarch 23, 2026 | 5 min read\r\nDigital bluprint with SnappyClient text.\r\nSecurity Research\r\nThreat Research\r\nTechnical Analysis of SnappyClient\r\nRead now\r\nPhoto Muhammed Irfan V A\r\nMuhammed Irfan V A\r\nMarch 18, 2026 | 26 min read\r\nMalware notification.\r\nSecurity Research\r\nThreat Research\r\nChina-nexus Threat Actor Targets Persian Gulf Region With PlugX\r\nRead now\r\nPhoto Sudeep Singh\r\nSudeep Singh\r\nMarch 12, 2026 | 16 min read\r\nHacker sitting in front of multiple computers\r\nSecurity Research\r\nThreat Research\r\nMiddle East Conflict Fuels Opportunistic Cyber Attacks\r\nRead now\r\nPhoto ThreatLabz\r\nThreatLabz\r\nMarch 06, 2026 | 12 min read\r\nA whirl of dust emanating from a laptop.\r\nhttp://research.zscaler.com/2015/08/chinese-cyber-espionage-apt-group.html\r\nPage 3 of 4\n\nSecurity Research\r\nThreat Research\r\nDust Specter APT Targets Government Officials in Iraq\r\nRead now\r\nPhoto Sudeep Singh\r\nSudeep Singh\r\nMarch 02, 2026 | 18 min read\r\nGet the latest Zscaler blog updates in your inbox\r\nBy submitting the form, you are agreeing to our privacy policy.\r\nSource: http://research.zscaler.com/2015/08/chinese-cyber-espionage-apt-group.html\r\nhttp://research.zscaler.com/2015/08/chinese-cyber-espionage-apt-group.html\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"http://research.zscaler.com/2015/08/chinese-cyber-espionage-apt-group.html"
	],
	"report_names": [
		"chinese-cyber-espionage-apt-group.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775438965,
	"ts_updated_at": 1775791254,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/46a831fcc988f099e004cc7129b936c953aa04cd.pdf",
		"text": "https://archive.orkl.eu/46a831fcc988f099e004cc7129b936c953aa04cd.txt",
		"img": "https://archive.orkl.eu/46a831fcc988f099e004cc7129b936c953aa04cd.jpg"
	}
}