Cybersecurity

MG – Darknet Diaries

Full Transcript In this episode we talk with MG (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG...

Navigating the labyrinth of forks

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into...

Welcoming Aura to Have I Been Pwned’s Partner Program

One of the greatest fears we all have in the wake of...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

At this year’s Black Hat USA conference, Sophos Senior Data Scientists Ben Gelman and Sean Bergeron will give a talk on their research into...

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms

Jul 16, 2025Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have flagged a new variant of a known malware loader called Matanbuchus that packs in significant...

What is UserAssist and how to use it in IR activities?

Introduction As members of the Global Emergency Response Team (GERT), we work with forensic artifacts on a daily basis to conduct investigations, and one of...

DShield Honeypot Log Volume Increase

The volume of honeypot logs changes over time. Very rarely are honeypot logs quiet, meaning that there are no internet scans or malicious activity...

Russian basketball player arrested in ransomware case despite being “useless with computers”

A Russian professional basketball player has been arrested for allegedly acting as a negotiator for a ransomware gang.26-year old Daniil Kasatkin, was reportedly arrested...

Predator – Darknet Diaries

Full Transcript A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Welcoming Push Security to Have I Been Pwned’s Partner Program

As we gradually roll out HIBP’s Partner Program, we’re aiming to deliver...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

Recent articles