Cybersecurity

We continue to encounter high-profile vulnerabilities related to the use of URL mapping (or "aliases") with URL-based access control. Last week, we wrote about the Oracle Identity Manager vulnerability. I noticed some scans for an older vulnerability...
CISA, the US Cybersecurity and Infrastructure Security Agency, has issued a new warning that cybercriminals and state-backed hacking groups are using spyware to compromise smartphones belonging to users of popular encrypted messaging apps such as Signal,...

Synthetic Remittance – Darknet Diaries

Full Transcript What do you get when you combine social engineering, email, crime, finance, and the money stream flowing through big...

What parents should know to protect their children from doxxing

Online disagreements among young people can easily spiral out of control. Parents...

Weekly Update 479

I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and...

WhatsApp compromise leads to Astaroth deployment – Sophos News

Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked...

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

Cybersecurity researchers are calling attention to a new campaign that's leveraging a combination of ClickFix lures and fake adult websites to deceive users into...

Advancing Cybersecurity for Microsoft Environments – Sophos News

I’m pleased to share three significant updates that advance cybersecurity for organizations that rely on Microsoft technologies. These milestones expand the reach of Sophos’...

ToddyCat APT’s new tools and techniques

Introduction Email remains the main means of business correspondence at organizations. It can be set up either using on-premises infrastructure (for example, by deploying Microsoft...

Use of CSS stuffing as an obfuscation technique?

From time to time, it can be instructive to look at generic phishing messages that are delivered to one’s inbox or that are caught...

Wind farm worker sentenced after turning turbines into a secret crypto mine

A technical manager at a Dutch wind farm operator has been sentenced to 120 hours of community service after it was discovered he had...

Jeremiah – Darknet Diaries

Full Transcript Jeremiah Roe is a seasoned penetration tester. In this episode he tells us about a time when he had...

What if your romantic AI chatbot can’t keep a secret?

Does your chatbot know too much? Here's why you should think twice...

Weekly Update 478

This week, it was an absolute privilege to be at Europol in The Hague, speaking about cyber offenders and at the InterCOP conference and...

Recent articles