Cybersecurity

Background RevengeHotels, also known as TA558, is a threat group that has been active since 2015, stealing credit card data from hotel guests and travelers. RevengeHotels’ modus operandi involves sending emails with phishing links which redirect victims...
When you’re debugging a malware sample, you probably run it into a debugger and define some breakpoints. The idea is to take over the program control before it will perform “interesting” actions. Usually, we set breakpoints on memory management...

Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security

At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers...

British rail passengers urged to stay on guard after hack signals failure

Passengers of the UK's state-owned London North Eastern Railway (LNER) have been warned to be vigilant after cybercriminals accessed traveller's contact details and some...

Vastaamo – Darknet Diaries

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...

Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware,...

Troy Hunt: Weekly Update 468

I only just realised, as I prepared this accompanying blog post, that...

September Patch Tuesday handles 81 CVEs – Sophos News

.Microsoft on Tuesday announced 81 patches affecting 15 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity,...

Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems

Sep 10, 2025Ravie LakshmananCybersecurity / Malware An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company...

Lumma Stealer, coming and going – Sophos News

In September 2024, a threat hunt across Sophos Managed Detection and Response’s telemetry uncovered a Lumma Stealer campaign using fake CAPTCHA sites that instructed...

Mobile cyberthreat report for Q2 2025

IT threat evolution in Q2 2025. Mobile statisticsIT threat evolution in Q2 2025. Non-mobile statistics The mobile section of our quarterly cyberthreat report includes statistics...

From YARA Offsets to Virtual Addresses, (Fri, Sep 5th)

YARA is an excellent tool that most of you probably already know and use daily. If you don't, search on isc.sans.edu, we have a...

GOP Cries Censorship Over Spam Filters That Work – Krebs on Security

The chairman of the Federal Trade Commission (FTC) last week sent a letter to Google’s CEO demanding to know why Gmail was blocking messages...

Parents warned that robot toys spied on children’s location without consent

Parents are being reminded to exercise caution about the toys that the purchase their children, after the United States Federal Trade Commission (FTC) announced...

Recent articles