Cybersecurity

Sophos analysts are investigating a new infection chain for the GOLD BLADE cybercriminal group’s custom RedLoader malware, which initiates command and control (C2) communications. The threat actors leverage a LNK file to remotely execute and sideload...
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it observed multiple incidents in the region, including...

Sophos’ Secure by Design 2025 Progress – Sophos News

In 2024, we became one of the first organizations to commit to CISA’s Secure by Design initiative. Aligned with our core organizational values around...

Targeted attacks leverage accounts on popular online platforms as C2 servers

Introduction In the latter half of 2024, the Russian IT industry, alongside a number of entities in other countries, experienced a notable cyberattack. The attackers...

Lessons Re-Learned from the Tea Breach

Today we are trying something a bit different (again). Brandon Evans, senior instructor with SANS, contributed the video below, talking a bit about the...

Replit panics, deletes $1M project; AI gets gold at Math Olympiad • Graham Cluley

In episode 61 of The AI Fix, a robot called DeREK goes bananas, OpenAI, Google DeepMind,...

Team Xecuter – Darknet Diaries

Full Transcript Team Xecuter was a group involved with making and selling modchips for video game systems. They often made mods...

ToolShell attacks hit organizations worldwide

The ToolShell bugs are being exploited by cybercriminals and APT groups alike,...

11 Years of Microsoft Regional Director and 15 Years of MVP

I often wonder how much people in other professions genuinely love the...

The revitalization of small AI models for cybersecurity – Sophos News

The last few months and years have seen a wave of AI integration across multiple sectors, driven by new technology and global enthusiasm. There...

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems

Jul 24, 2025Ravie LakshmananVulnerability / Network Security Mitel has released security updates to address a critical security flaw in MiVoice MX-ONE that could allow an...

SOC files: an APT41 attack on government IT services in Africa

Introduction Some time ago, Kaspersky MDR analysts detected a targeted attack against government IT services in the African region. The attackers used hardcoded names of...

WinRAR MoTW Propagation Privacy – SANS Internet Storm Center

Since WinRAR 7.10, not all Mark-of-The-Web data (stored in the Zone.Identifier Alternate Data Stream) is propagated when you extract a file from an archive. Take...

Europol targets Kremlin-backed cybercrime gang NoName057(16)

A pro-Kremlin cybercrime network has been taken offline after an international law enforcement operation disrupted over 100 of its servers, detained two gang members,...

Recent articles