Cybersecurity

Anomaly detection betrayed us, so we gave it a new job – Sophos News

At this year’s Black Hat USA conference, Sophos Senior Data Scientists Ben Gelman and Sean Bergeron will give a talk on their research into...

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms

Jul 16, 2025Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have flagged a new variant of a known malware loader called Matanbuchus that packs in significant...

What is UserAssist and how to use it in IR activities?

Introduction As members of the Global Emergency Response Team (GERT), we work with forensic artifacts on a daily basis to conduct investigations, and one of...

DShield Honeypot Log Volume Increase

The volume of honeypot logs changes over time. Very rarely are honeypot logs quiet, meaning that there are no internet scans or malicious activity...

Russian basketball player arrested in ransomware case despite being “useless with computers”

A Russian professional basketball player has been arrested for allegedly acting as a negotiator for a ransomware gang.26-year old Daniil Kasatkin, was reportedly arrested...

Predator – Darknet Diaries

Full Transcript A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Welcoming Push Security to Have I Been Pwned’s Partner Program

As we gradually roll out HIBP’s Partner Program, we’re aiming to deliver...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Jul 08, 2025Ravie LakshmananMalware / Cybercrime In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it has been discovered that hackers...

How the Batavia spyware targeting Russian organizations works

Introduction Since early March 2025, our systems have recorded an increase in detections of similar files with names like договор-2025-5.vbe, приложение.vbe, and dogovor.vbe (translation: contract,...

Scans for Ichano AtHome IP Cameras, (Mon, Jun 23rd)

Ichano's "AtHome Camera" is a bit of a different approach to home surveillance cameras . Instead of a hardware camera solution, this product is...

Recent articles