Cybersecurity

File Hashes Analysis with Power BI from Data Stored in DShield SIEM

I previously used Power BI to analyze DShield sensor data and this time I wanted to show how it could be used by...

6 Zero-Days in March 2025 Patch Tuesday – Krebs on Security

Microsoft today issued more than 50 security updates for its various Windows operating systems, including fixes for a whopping six zero-day vulnerabilities that are...

Can AIs be psychopaths, and why we should be AI optimists • Graham Cluley

In episode 41 of the AI Fix, our hosts learn that society needs to be completely...

Kingpin – Darknet Diaries

Full Transcript In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A renowned hardware...

DeceptiveDevelopment targets freelance developers

Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers....

Troy Hunt: Weekly Update 442

We survived the cyclone! That was a seriously weird week with lots...

Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS – Sophos News

Back in August 2022, Sophos X-Ops published a white paper on multiple attackers – that is, adversaries targeting the same organizations multiple times. One...

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Mar 06, 2025Ravie LakshmananData Security / Software Security Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization...

SilentCryptoMiner distributed as a bypass tool

In recent months, we’ve seen an increase in the use of Windows Packet Divert drivers to intercept and modify network traffic in Windows systems....

Romanian Distillery Scanning for SMTP Credentials

Lately, attackers have gotten more creative and aggressive in trying to find various credential files on exposed web servers. Our "First Seen" page each...

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian...

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Companies are being warned that malicious hackers are using a novel technique to break into businesses - by pretending to offer audits of the...

Recent articles