Cybersecurity

Kaspersky ransomware report for 2024

Global ransomware trends and numbers With the International Anti-Ransomware Day just around the corner on May 12, Kaspersky explores the ever-changing ransomware threat landscape and...

Python InfoStealer with Embedded Phishing Webserver

Infostealers are everywhere for a while now. If this kind of malware is not aggressive, their impact can be much more impacting to the...

Hacking hijinks at the hospital, and WASPI scams • Graham Cluley

He’s not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of...

Revenge Bytes – Darknet Diaries

Full Transcript Madison’s nude photos were posted online. Her twin sister Christine came to help. This begins a bizarre and uneasy...

It’s a wrap! RSAC 2025 highlights – Week in security with Tony Anscombe

From the power of collaborative defense to identity security and AI, catch...

Weekly Update 450

Looking back at this week's video, it's the AI discussion that I think about most. More specifically, the view amongst some that any usage...

Finding Minhook in a sideloading attack – and Sweden too – Sophos News

Late in 2023 and during the first half of 2024, we monitored an attack campaign targeting several of our customers in multiple locations. Though...

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

Apr 30, 2025Ravie LakshmananArtificial Intelligence / Email Security As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has...

Cybercrime on Main Street 2025 – Sophos News

Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in...

A new version of Triada spreads embedded in the firmware of Android devices

Introduction Older versions of Android contained various vulnerabilities that allowed gaining root access to the device. Many malicious programs exploited these to elevate their system...

SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics

For digital forensics and incident response professionals, extracting precise evidence from Windows systems is critical to understanding and mitigating threats. I’m excited to introduce...

Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this...

Recent articles