Cybersecurity

Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much ...
I've listened to a few industry podcasts discussing the Tea app breach since recording, and the thing that really struck me was the lack of discussion around the privacy implications of the service before the breach....

GOLD BLADE remote DLL sideloading attack deploys RedLoader – Sophos News

Sophos analysts are investigating a new infection chain for the GOLD BLADE cybercriminal group’s custom RedLoader malware, which initiates command and control (C2) communications....

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown

Aug 01, 2025Ravie LakshmananMalware / Artificial Intelligence Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed a...

Sophos’ Secure by Design 2025 Progress – Sophos News

In 2024, we became one of the first organizations to commit to CISA’s Secure by Design initiative. Aligned with our core organizational values around...

Targeted attacks leverage accounts on popular online platforms as C2 servers

Introduction In the latter half of 2024, the Russian IT industry, alongside a number of entities in other countries, experienced a notable cyberattack. The attackers...

Triage is Key! Python to the Rescue!

When you need to quickly analyze a lot of data, there is one critical step to perform: Triage. In forensic investigations, this step is...

Phishers Target Aviation Execs to Scam Customers – Krebs on Security

KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending...

Free decryptor for victims of Phobos ransomware released

There is good news for any organisation which has been hit by the Phobos ransomware. Japanese police have released a free decryptor capable of recovering...

Grifter – Darknet Diaries

Full Transcript Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days...

Why is your data worth so much?

Behind every free online service, there's a price being paid. Learn why...

11 Years of Microsoft Regional Director and 15 Years of MVP

I often wonder how much people in other professions genuinely love the...

The revitalization of small AI models for cybersecurity – Sophos News

The last few months and years have seen a wave of AI integration across multiple sectors, driven by new technology and global enthusiasm. There...

How to Advance from SOC Manager to CISO?

Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not...

Recent articles