Cybersecurity

What “Nigerian” spam looks like in the mid-2020s

“Nigerian” spam is a collective term for messages designed to entice victims with alluring offers and draw them into an email exchange with scammers,...

DShield SIEM Docker Updates – SANS Internet Storm Center

Over the past several weeks, I have been testing various enhancements to the DShield SIEM, to process DShield sensor log from local and cloud...

Microsoft Patch Tuesday, February 2025 Edition – Krebs on Security

Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that...

Toll booth bandits continue to scam via SMS messages

North American drivers are continuing to be barraged by waves of scam text messages, telling them that they owe money on unpaid tolls.Last month...

Hijacked Line – Darknet Diaries

Full Transcript Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how...

Evasive Panda scouting cloud services

In this blogpost, we provide a technical analysis of CloudScout, a post-compromise toolset used by Evasive Panda to target a...

Weekly Update 437

It's IoT time! We're embarking on a very major home project (more detail of which is in the video), and some pretty big decisions...

Scalable Vector Graphics files pose a novel phishing threat – Sophos News

Criminals who conduct phishing attacks over email have ramped up their abuse of a new threat vector designed to bypass existing anti-spam and anti-phishing...

Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking

Feb 06, 2025Ravie LakshmananCyber Attack / Malware Bogus websites advertising Google Chrome have been used to distribute malicious installers for a remote access trojan called...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

How cyberattackers exploit group policies

Windows group policies are a powerful management tool that allows administrators to define and control user and computer settings within a domain environment in...

Crypto Wallet Scam – SANS Internet Storm Center

Johannes noticed a SPAM comment on his YouTube channel: It was clear to us that this was a scam, but it wasn't clear to us...

Recent articles