Cybersecurity

Kingpin – Darknet Diaries

Full Transcript In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A renowned hardware...

DeceptiveDevelopment targets freelance developers

Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers....

We’re Backfilling and Cleaning Stealer Logs in Have I Been Pwned

I think I've finally caught my breath after dealing with those 23...

Gootloader inside out – Sophos News

... That hidden element had links (selected with green) and the matching targeted search terms (selected with brown): This hidden element will not be visible to...

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

Mar 01, 2025Ravie LakshmananPrivacy / Data Protection Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following...

Our CISO’s view of Pacific Rim – Sophos News

Sophos is not the first cybersecurity vendor to find its perimeter products the target of sustained nation-state attack. If anything is special about the...

Kaspersky SOC analyzes an incident involving a web shell used as a backdoor

Web shells have evolved far beyond their original purpose of basic remote command execution, and many now function more like lightweight exploitation frameworks. These...

Njrat Campaign Using Microsoft Dev Tunnels

I spotted new  Njrat samples that (ab)use the Microsoft dev tunnels service to connect to their C2 servers. This is a service that allows developers...

Trump 2.0 Brings Cuts to Cyber, Consumer Protections – Krebs on Security

One month into his second term, President Trump’s actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have...

AIs value their lives over yours, and flattery gets you nowhere • Graham Cluley

In episode 39 of the AI Fix, our hosts watch a drone and a robot dog...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims'...

Recent articles