Cybersecurity

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Oct 07, 2025Ravie LakshmananMalware / Threat Intelligence A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics...

Developing a machine-learning model to detect DLL hijacking

DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used...

Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882)

This weekend, Oracle published a surprise security bulletin announcing an exploited vulnerability in Oracle E-Business Suite. As part of the announcement, which also included...

Ransomware attack leaves nation days away from Asahi beer shortage

Beer lovers will be sobbing into their pints at the news that a ransomware attack has brought Japan's largest brewer to its knees and...

Jason’s Pen Test – Darknet Diaries

Full Transcript Join us as we sit down with Jason Haddix, a renowned penetration tester who has made a name for...

How SMBs can fight back against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are...

Welcoming CERN to Have I Been Pwned

It's hard to explain the significance of CERN. It's the birthplace of...

HeartCrypt’s wholesale impersonation effort – Sophos News

Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes: Malware impersonating, subverting, and...

EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for future attacks on organizations worldwide. According...

What happens when a cybersecurity company gets phished? – Sophos News

If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a...

Shai-Hulud worm infects npm packages

Introduction The modern development world is almost entirely dependent on third-party modules. While this certainly speeds up development, it also creates a massive attack surface...

New tool: convert-ts-bash-history.py – SANS ISC

In SANS FOR577, we talk about timelines on day 5, both filesystem and super-timelines. but sometimes, I want something quick and dirty and rather...

Recent articles