Cybersecurity

Kingpin – Darknet Diaries

Full Transcript In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A renowned hardware...

DeceptiveDevelopment targets freelance developers

Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers....

Troy Hunt: Weekly Update 442

We survived the cyclone! That was a seriously weird week with lots...

Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS – Sophos News

Back in August 2022, Sophos X-Ops published a white paper on multiple attackers – that is, adversaries targeting the same organizations multiple times. One...

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Mar 06, 2025Ravie LakshmananData Security / Software Security Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization...

SilentCryptoMiner distributed as a bypass tool

In recent months, we’ve seen an increase in the use of Windows Packet Divert drivers to intercept and modify network traffic in Windows systems....

Romanian Distillery Scanning for SMTP Credentials

Lately, attackers have gotten more creative and aggressive in trying to find various credential files on exposed web servers. Our "First Seen" page each...

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian...

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Companies are being warned that malicious hackers are using a novel technique to break into businesses - by pretending to offer audits of the...

Rachel – Darknet Diaries

Full Transcript Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a...

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims'...

Processing 23 Billion Rows of ALIEN TXTBASE Stealer Logs

I like to start long blog posts with a tl;dr, so here...

Recent articles