Cybersecurity

‘What happens online stays online’ and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting...

Weekly Update 465

How much tech stuff do I have sitting there in progress, literally just within arm's reach? I kick off this week's video going through...

Threat Intelligence Executive Report – Volume 2025, Number 4 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™...

Key Findings from the Blue Report 2025

As security professionals, it's easy to get caught up in a race to counter the latest advanced adversary techniques. Yet the most impactful attacks...

Gh0st RAT-based GodRAT attacks financial organizations

Summary In September 2024, we detected malicious activity targeting financial (trading and brokerage) firms through the distribution of malicious .scr (screen saver) files disguised as...

Keeping an Eye on MFA-Bombing Attacks

I recently woke up (as one does each day, hopefully) and saw a few Microsoft MFA prompts had pinged me overnight.  Since I had...

Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme – Krebs on Security

Cybercriminal groups peddling sophisticated phishing kits that convert stolen card data into mobile wallets have recently shifted their focus to targeting customers of brokerage...

Poisoned Calendar invites, ChatGPT, and Bromide • Graham Cluley

A poisoned Google Calendar invite that can hijack your smart home, a man is hospitalised after...

I’m the Real Connor – Darknet Diaries

Full Transcript One day Connor Tumbleson got an email saying his identity has been stolen. And this was one of the...

Check your risk blind spot

Does your business truly understand its dependencies, and how to mitigate the...

That 16 Billion Password Story (AKA “Data Troll”)

Spoiler: I have data from the story in the title of this...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious...

Recent articles