Cybersecurity

Quick Password Brute Forcing Evolution Statistics

We have collected SSH and telnet honeypot data in various forms for about 10 years. Yesterday's diaries, and looking at some new usernames attempted...

ChatGPT traps man in a cult of one, and AI is actually stupid • Graham Cluley

In episode 56 of The AI Fix, Anthropic and Apple have a bar fight, a woman...

Team Xecuter – Darknet Diaries

Full Transcript Team Xecuter was a group involved with making and selling modchips for video game systems. They often made mods...

This month in security with Tony Anscombe – May 2025 edition

From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life...

Troy Hunt: Weekly Update 457

Firstly, apologies for the annoying clipping in the audio. I use a...

June Patch Tuesday digs into 67 bugs – Sophos News

.Microsoft on Tuesday released 67 patches affecting 12 product families. Ten of the addressed issues, five involving 365 and Office and one involving SharePoint,...

200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that claim to offer Python-based...

New BrowserVenom malware being distributed via fake DeepSeek phishing website

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels look for chatbot websites on search engines, and threat...

Don?t Make it Easier than it Already is?..Default Passwords [Guest Diary]

Over the past few months, I’ve been working under a SANS Internet Storm Center (ISC) Sr. Handler as part of the SANS Degree Program...

Dutch police identify users as young as 11-year-old on Cracked.io hacking forum

Dutch police have announced that they have identified 126 individuals linked to the now dismantled Cracked.io cybercrime forum.Cracked.io was an online platform used by...

Predator – Darknet Diaries

Full Transcript A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then...

Don’t let dormant accounts become a doorway for cybercriminals

Do you have online accounts you haven't used in years? If so,...

Recent articles