Cybersecurity

The BetterBank DeFi protocol exploited for reward minting

Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on the PulseChain network, fell victim to a sophisticated exploit...

What time is it? Accuracy of pool.ntp.org.

Yesterday, Chinese security services published a story alleging a multi-year attack against the systems operating the Chinese standard time (CST), sometimes called Beijing Standard...

Email Bombs Exploit Lax Authentication in Zendesk – Krebs on Security

Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing messages that come...

Operation Heracles strikes blow against massive network of fraudulent crypto trading sites

In a significant crackdown against online cybercriminals, German authorities have successfully dismantled a network of fraudulent cryptocurrency investment sites that has targeted millions of...

Gollumfun (Part 1) – Darknet Diaries

Full Transcript Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story...

Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware,...

Troy Hunt: Weekly Update 473

This week's video was recorded on Friday morning Aussie time, and as...

WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started...

How Threat Hunting Builds Readiness

Every October brings a familiar rhythm - pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox....

Developing a machine-learning model to detect DLL hijacking

DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used...

RedTail Observations from a Honeypot

.] Ransomware is often the first word that comes to mind when we think about cybercriminals chasing financial gain. It barges in, locks files,...

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS – Krebs on Security

The world’s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet...

Recent articles

Weekly Update 479