Cybersecurity

That 16 Billion Password Story (AKA “Data Troll”)

Spoiler: I have data from the story in the title of this...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious...

Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors

Aug 12, 2025Ravie LakshmananVulnerability / Threat Intelligence The Dutch National Cyber Security Centre (NCSC-NL) has warned of cyber attacks exploiting a recently disclosed critical security...

Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365 – Sophos News

Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants...

Efimer Trojan delivered via email and hacked WordPress websites

Introduction In June, we encountered a mass mailing campaign impersonating lawyers from a major company. These emails falsely claimed the recipient’s domain name infringed on...

Mass Internet Scanning from ASN 43350 [Guest Diary]

During the last three months I've had a DShield sensor online and collecting data from a deployment in AWS. This week I did some...

Who Got Arrested in the Raid on the XSS Crime Forum? – Krebs on Security

On July 22, 2025, the European police agency Europol said a long-running investigation led by the French Police resulted in the arrest of a...

Ransomware plunges insurance company into bankruptcy

A company, which offered insurance and repair services to cell phone owners across Germany, and generated revenues of up to 70 million Euros (US...

Hieu – Darknet Diaries

Full Transcript All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found...

Is your phone spying on you?

Here's what you need to know about the inner workings of modern...

Weekly Update 463

I've listened to a few industry podcasts discussing the Tea app breach since recording, and the thing that really struck me was the lack...

GOLD BLADE remote DLL sideloading attack deploys RedLoader – Sophos News

Sophos analysts are investigating a new infection chain for the GOLD BLADE cybercriminal group’s custom RedLoader malware, which initiates command and control (C2) communications....

Recent articles