Cybersecurity

Njrat Campaign Using Microsoft Dev Tunnels

I spotted new  Njrat samples that (ab)use the Microsoft dev tunnels service to connect to their C2 servers. This is a service that allows developers...

Trump 2.0 Brings Cuts to Cyber, Consumer Protections – Krebs on Security

One month into his second term, President Trump’s actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have...

AIs value their lives over yours, and flattery gets you nowhere • Graham Cluley

In episode 39 of the AI Fix, our hosts watch a drone and a robot dog...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims'...

Troy Hunt: Weekly Update 439

We're now eyeball-deep into the HIBP rebrand and UX work, totally overhauling...

February Patch Tuesday delivers 57 packages – Sophos News

Microsoft on Tuesday released 57 patches touching 13 product families. Two of the addressed issues are considered by Microsoft to be of Critical severity,...

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

StaryDobry campaign targets gamers with XMRig miner

Introduction On December 31, cybercriminals launched a mass infection campaign, aiming to exploit reduced vigilance and increased torrent traffic during the holiday season. Our telemetry...

My Very Personal Guidance and Strategies to Protect Network Edge Devices

Last week, CISA and other national cyber security organizations published an extensive document outlining "Guidance and Strategies to Protect Network Edge Devices."  The document...

Nearly a Year Later, Mozilla is Still Promoting OneRep – Krebs on Security

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search companies. Shortly after that...

Recent articles