Cybersecurity

Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers. After all, what better time to strike than when the potential victim...
Designing the first logo for Have I Been Pwned was easy: I took a SQL injection pattern, wrote "have i been pwned?" after it...

Scalable Vector Graphics files pose a novel phishing threat – Sophos News

Criminals who conduct phishing attacks over email have ramped up their abuse of a new threat vector designed to bypass existing anti-spam and anti-phishing...

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

Mar 10, 2025Ravie LakshmananCybersecurity / Malware Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. "The...

Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign – Sophos News

Once used exclusively by the cybercriminals behind REVil ransomware and the Gootkit banking trojan, GootLoader and its primary payload have evolved into an initial...

Stealers and backdoors are spreading under the guise of a DeepSeek client

Introduction Among the most significant events in the AI world in early 2025 was the release of DeepSeek-R1 – a powerful reasoning large language model...

DShield Traffic Analysis using ELK

Using the Kibana interface, sometimes it can be difficult to find traffic of interest since there can be so much of it. The 3...

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian...

Fake police call cryptocurrency investors to steal their funds

Have you had a phone call from police about your cryptocurrency wallet?Be on your guard - you could be about to be scammed.That's the...

Kingpin – Darknet Diaries

Full Transcript In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A renowned hardware...

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims'...

Weekly Update 441

Processing data breaches (especially big ones), can be extremely laborious. And, of course, everyone commenting on them is an expert, so there's a heap...

February Patch Tuesday delivers 57 packages – Sophos News

Microsoft on Tuesday released 57 patches touching 13 product families. Two of the addressed issues are considered by Microsoft to be of Critical severity,...

a Double-Edged Sword for IT Teams – Essential Yet Exploitable

Remote Desktop Protocol (RDP) is an amazing technology developed by Microsoft that lets you access and control another computer over a network. It's like...

Recent articles