Cybersecurity

SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics

For digital forensics and incident response professionals, extracting precise evidence from Windows systems is critical to understanding and mitigating threats. I’m excited to introduce...

Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this...

The Pig Butcher – Darknet Diaries

Full Transcript The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering....

How fraudsters abuse Google Forms to spread scams

The form and quiz-building tool is a popular vector for social engineering...

Weekly Update 448

I'm a few days late this week, finally back from a month of (almost) non-stop travel with the last bit being completely devoid of...

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

Apr 22, 2025Ravie LakshmananCyber Espionage / Threat Intelligence The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised...

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor

Day after day, threat actors create new malware to use in cyberattacks. Each of these new implants is developed in its own way, and...

RedTail, Remnux and Malware Management [Guest Diary], (Wed, Apr 16th)

Introduction When I first saw malware being uploaded to my honeypot, I was lacking the requisite experience to reverse engineer it, and to understand what...

Hacking the hackers… with a credit card? • Graham Cluley

A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that...

Axact – Darknet Diaries

Full Transcript Axact sells fake diplomas and degrees. What could go wrong with this business plan? Support for this episode comes from...

Recent articles