Cybersecurity

What happens when a cybersecurity company gets phished? – Sophos News

If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a...

Kaspersky industrial threat report for Q2 2025

Statistics across all threats In Q2 2025, the percentage of ICS computers on which malicious objects were blocked decreased by 1.4 pp from the previous...

[Guest Diary] Distracting the Analyst for Fun and Profit

.] Distributed denial of service (DDoS) attacks are a type of cyber-attack where the threat actor attempts to disrupt a service by flooding the target...

Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security

At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers...

US citizen charged in latest twist of notorious data breach

The Vastaamo hack was the worst data breach in Finnish history.Psychotherapy clinic Vastaamo found itself the victim of an extortionist who hacked its systems...

Jason’s Pen Test – Darknet Diaries

Full Transcript Join us as we sit down with Jason Haddix, a renowned penetration tester who has made a name for...

How SMBs can fight back against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are...

Weekly Update 469

So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to...

GOLD SALEM’s Warlock operation joins busy ransomware landscape – Sophos News

Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group. The group, which CTU™ researchers track as...

New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

Sep 16, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic...

Malicious MCP servers used in supply chain attacks

Introduction In this article, we explore how the Model Context Protocol (MCP) — the new “plug-in bus” for AI assistants — can be weaponized as...

DShield SIEM Docker Updates – SANS Internet Storm Center

Since the last update , over the past few months I added several enhancements to DShield SIEM and webhoneypot sensor collection that included an...

Recent articles