Cybersecurity

1,900 messages and 205 Bitcoin addresses spanning four years

What can almost 2,000 sextortion messages tell us about how threat actors operate and whether they are successful? Let’s find out. Although it is true...

Hacker suspected of trying to cheat his way into university is arrested in Spain

Spanish police have arrested a suspected hacker for accessing a government website in order to alter the high school and university entrance exam grades...

I’m the Real Connor – Darknet Diaries

Full Transcript One day Connor Tumbleson got an email saying his identity has been stolen. And this was one of the...

This month in security with Tony Anscombe – August 2025 edition

From Meta shutting down millions of WhatsApp accounts linked to scam centers...

Home Assistant + Ubiquiti + AI = Home Automation Magic

It seems like every manufacturer of anything electrical that goes in the house wants to be part of the IoT story these days. Further,...

Velociraptor incident response tool abused for remote access – Sophos News

In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital forensics and incident response...

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. "Unlike...

Modern vehicles: the cybersecurity trends

Modern vehicles are transforming into full-fledged digital devices that offer a multitude of features, from common smartphone-like conveniences to complex intelligent systems and services...

Reading Location Position Value in Microsoft Word Documents

While studying for the GX-FE , I started exploring the "Position" value in the registry that helps to tell Microsoft Word where you "left...

Europol says Telegram post about 50,000 Qilin ransomware award is fake

It's not unusual for law enforcement agencies to offer substantial rewards for information which might lead to the identification, arrest, and conviction of cybercriminals.For...

Deviant – Darknet Diaries

Full Transcript Deviant Ollam is a physical penetration specialist. That means he’s paid to break into buildings to see if the...

‘What happens online stays online’ and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting...

Recent articles