Cybersecurity

In the beginning of my Internet Storm Center (ISC) internship, I wasted too much time trying to build my SIEM from an old computer I had lying around, or a new Raspberry Pi I purchased. I...
In episode 54 of The AI Fix, Graham saves humanity with a CAPTCHA, Mark wonders whether AI can suffer, ChatGPT throws shade at Abba’s Björn Ulvaeus, an AI...

Vastaamo – Darknet Diaries

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...

BladedFeline: Whispering in the dark

In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT...

Troy Hunt: Weekly Update 454

We're two weeks in from the launch of the new HIBP, and...

When cybercriminals eat their own – Sophos News

At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer...

Desktop and IoT threat statistics for Q1 2025

IT threat evolution in Q1 2025. Non-mobile statisticsIT threat evolution in Q1 2025. Mobile statistics The statistics in this report are based on detection verdicts...

Phishing e-mail that hides malicious link from Outlook users

I recently came across an interesting phishing e-mail. At first glance, it looked like a “normal” phishing that tried to pass itself off as...

Russian hackers targeted UK Ministry of Defence

The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked hackers pose as journalists.The...

Revenge Bytes – Darknet Diaries

Full Transcript Madison’s nude photos were posted online. Her twin sister Christine came to help. This begins a bizarre and uneasy...

This month in security with Tony Anscombe – May 2025 edition

From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life...

Weekly Update 453

Well, the last few weeks of insane hours finally caught up with me 🤒 Not badly, but I evidently burned enough midnight oil to...

3AM ransomware actors dropped virtual machine with vishing and Quick Assist – Sophos News

Ransomware is usually a crime of opportunity.  Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge devices...

Recent articles