Cybersecurity

Troy Hunt: Weekly Update 471

I'm so happy to finally be getting those HIBP demos out! The...

HeartCrypt’s wholesale impersonation effort – Sophos News

Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes: Malware impersonating, subverting, and...

New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks

The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed to deliver two...

What happens when a cybersecurity company gets phished? – Sophos News

If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a...

Kaspersky industrial threat report for Q2 2025

Statistics across all threats In Q2 2025, the percentage of ICS computers on which malicious objects were blocked decreased by 1.4 pp from the previous...

[Guest Diary] Distracting the Analyst for Fun and Profit

.] Distributed denial of service (DDoS) attacks are a type of cyber-attack where the threat actor attempts to disrupt a service by flooding the target...

Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security

At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers...

US citizen charged in latest twist of notorious data breach

The Vastaamo hack was the worst data breach in Finnish history.Psychotherapy clinic Vastaamo found itself the victim of an extortionist who hacked its systems...

Jason’s Pen Test – Darknet Diaries

Full Transcript Join us as we sit down with Jason Haddix, a renowned penetration tester who has made a name for...

How SMBs can fight back against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are...

Weekly Update 469

So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to...

GOLD SALEM’s Warlock operation joins busy ransomware landscape – Sophos News

Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group. The group, which CTU™ researchers track as...

Recent articles

Weekly Update 476