Cybersecurity

Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been...
Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in that report remained a major menace in 2024, including ransomware–which remains a...

Lazarus APT updates its toolset in watering hole attacks

We have been tracking the latest attack campaign by the Lazarus group since last November, as it targeted organizations in South Korea with a...

Honeypot Iptables Maintenance and DShield-SIEM Logging

In the last week I ran into some issues that I hadn't anticipated: Residential IP changed, some honeypots inacessible remotely Rebuilit DShield-SIEM , Zeek logs not...

An AI is the best computer programmer in the world • Graham Cluley

In episode 47 of The AI Fix, o3 becomes the best competitive programmer in the world,...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Look out! CapCut copycats are on the prowl

Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to...

Weekly Update 447

I'm home! Well, for a day, then it's off to the other side of the country (which I just flew over last night on...

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported...

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

GOFFEE’s recent attacks: new tools and techniques

GOFFEE is a threat actor that first came to our attention in early 2022. Since then, we have observed malicious activities targeting exclusively entities...

xorsearch.py: Searching With Regexes – SANS Internet Storm Center

As promised in diary entry "XORsearch: Searching With Regexes", I will outline another method to search with xorsearch and regexes. In stead of XORsearch.exe, the...

Ransomware Reaches A Record High, But Payouts Are Dwindling

Shed a tear, if you can, for the poor, misunderstood cybercriminals hard at work trying to earn a dishonest crust by infecting organisations with...

Recent articles