Cybersecurity

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of forks and variants. While its capabilities are not...
This week's update is the last remote one for a while as we wind up more than a month of travel. I'm pushing this out just before we jump on the Qantas plane home... right after...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

At this year’s Black Hat USA conference, Sophos Senior Data Scientists Ben Gelman and Sean Bergeron will give a talk on their research into...

CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

Jul 14, 2025Ravie LakshmananCybercrime / Law Enforcement India's Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said...

The Solidity Language open-source package was used in a $500,000 crypto heist

Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected...

SSH Tunneling in Action: direct-tcp requests [Guest Diary]

As part of the SANS degree program curriculum, I had the opportunity to set up a honeypot to monitor log activities mimicking a vulnerable...

From pew-pew to pwned • Graham Cluley

In episode 425 of “Smashing Security”, Graham reveals how “Call of Duty: WWII” has been weaponised...

The D.R. Incident – Darknet Diaries

Full Transcript Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Weekly Update 459

New week, different end of the world! After a fleeting stop at home, we're in Japan for a proper holiday (yet somehow I'm still...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

Jul 05, 2025Ravie LakshmananNational Security / Privacy Taiwan's National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat,...

Scans for Ichano AtHome IP Cameras

Ichano's "AtHome Camera" is a bit of a different approach to home surveillance cameras . Instead of a hardware camera solution, this product is...

Recent articles