Cybersecurity

Toll booth bandits continue to scam via SMS messages

North American drivers are continuing to be barraged by waves of scam text messages, telling them that they owe money on unpaid tolls.Last month...

Hijacked Line – Darknet Diaries

Full Transcript Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how...

Evasive Panda scouting cloud services

In this blogpost, we provide a technical analysis of CloudScout, a post-compromise toolset used by Evasive Panda to target a...

Weekly Update 437

It's IoT time! We're embarking on a very major home project (more detail of which is in the video), and some pretty big decisions...

Scalable Vector Graphics files pose a novel phishing threat – Sophos News

Criminals who conduct phishing attacks over email have ramped up their abuse of a new threat vector designed to bypass existing anti-spam and anti-phishing...

Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking

Feb 06, 2025Ravie LakshmananCyber Attack / Malware Bogus websites advertising Google Chrome have been used to distribute malicious installers for a remote access trojan called...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

How cyberattackers exploit group policies

Windows group policies are a powerful management tool that allows administrators to define and control user and computer settings within a domain environment in...

Crypto Wallet Scam – SANS Internet Storm Center

Johannes noticed a SPAM comment on his YouTube channel: It was clear to us that this was a scam, but it wasn't clear to us...

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang – Krebs on Security

The FBI and authorities in The Netherlands this week seized dozens of servers and domains for a hugely popular spam and malware dissemination service...

Hackers get hacked, the British Museum IT shutdown, and social media kidnaps • Graham Cluley

What happens when eager computer enthusiasts unknowingly download a trojanized hacking tool and find themselves on...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Recent articles