Cybersecurity

How cyberattackers exploit group policies

Windows group policies are a powerful management tool that allows administrators to define and control user and computer settings within a domain environment in...

Crypto Wallet Scam – SANS Internet Storm Center

Johannes noticed a SPAM comment on his YouTube channel: It was clear to us that this was a scam, but it wasn't clear to us...

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang – Krebs on Security

The FBI and authorities in The Netherlands this week seized dozens of servers and domains for a hugely popular spam and malware dissemination service...

Hackers get hacked, the British Museum IT shutdown, and social media kidnaps • Graham Cluley

What happens when eager computer enthusiasts unknowingly download a trojanized hacking tool and find themselves on...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Tony Fadell: Innovating to save our planets

We Live Science As methane emissions come under heightened global scrutiny, learn how...

Weekly Update 436

We're heading back to London! And making a trip to Reykjavik. And Dublin. I talked about us considering this in the video yesterday, and...

Cybercriminals still not fully on board the AI train (yet) – Sophos News

In November 2023, Sophos X-Ops published research exploring threat actors’ attitudes towards generative AI, focusing on discussions on selected cybercrime forums. While we did...

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

Jan 27, 2025Ravie LakshmananVulnerability / Software Security Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully...

Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” – Sophos News

Sophos X-Ops’ Managed Detection and Response (MDR) is actively responding to incidents tied to two separate groups of threat actors, each of which have...

A closer look at the Mercedes-Benz infotainment system security

Introduction This report covers the research of the Mercedes-Benz Head Unit, which was made by our team. Mercedes-Benz’s latest Head Unit (infotainment system) is called...

[Guest Diary] How Access Brokers Maintain Persistence

program] Access brokers are groups referred to that obtain initial access in compromised environments, establish persistence through different methods, and sell this access to...

Recent articles