Cybersecurity

MG – Darknet Diaries

Full Transcript In this episode we talk with MG (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG...

Navigating the labyrinth of forks

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into...

Weekly Update 460

This week's update is the last remote one for a while as we wind up more than a month of travel. I'm pushing this...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

At this year’s Black Hat USA conference, Sophos Senior Data Scientists Ben Gelman and Sean Bergeron will give a talk on their research into...

CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

Jul 14, 2025Ravie LakshmananCybercrime / Law Enforcement India's Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said...

The Solidity Language open-source package was used in a $500,000 crypto heist

Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected...

SSH Tunneling in Action: direct-tcp requests [Guest Diary]

As part of the SANS degree program curriculum, I had the opportunity to set up a honeypot to monitor log activities mimicking a vulnerable...

From pew-pew to pwned • Graham Cluley

In episode 425 of “Smashing Security”, Graham reveals how “Call of Duty: WWII” has been weaponised...

The D.R. Incident – Darknet Diaries

Full Transcript Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Weekly Update 459

New week, different end of the world! After a fleeting stop at home, we're in Japan for a proper holiday (yet somehow I'm still...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

Recent articles