Cybersecurity

Weekly Update 465

How much tech stuff do I have sitting there in progress, literally just within arm's reach? I kick off this week's video going through...

Threat Intelligence Executive Report – Volume 2025, Number 4 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™...

Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems

Aug 19, 2025Ravie LakshmananLinux / Malware Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux...

PipeMagic in 2025: How the backdoor operators’ tactics have changed

In April 2025, Microsoft patched 121 vulnerabilities in its products. According to the company, only one of them was being used in real-world attacks...

Sniffing and Injecting 5G Traffic Without Rogue Base Stations

As the world gradually adopts and transitions to using 5G for mobile, operational technology (OT), automation and Internet-of-Things (IoT) devices, a secure 5G network...

Poisoned Calendar invites, ChatGPT, and Bromide • Graham Cluley

A poisoned Google Calendar invite that can hijack your smart home, a man is hospitalised after...

The D.R. Incident – Darknet Diaries

Full Transcript Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks...

Check your risk blind spot

Does your business truly understand its dependencies, and how to mitigate the...

That 16 Billion Password Story (AKA “Data Troll”)

Spoiler: I have data from the story in the title of this...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious...

New TETRA Radio Encryption Flaws Expose Law Enforcement Communications

Aug 11, 2025Ravie LakshmananEncryption / Network Security Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications protocol,...

Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365 – Sophos News

Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants...

Recent articles