Cybersecurity

Threat Intelligence Executive Report – Volume 2025, Number 5 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™...

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Oct 20, 2025Ravie LakshmananThreat Intelligence / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known...

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

Malicious package with AdaptixC2 framework agent found in npm registry

Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative to the well-known Cobalt Strike, was made publicly available...

TikTok Videos Promoting Malware Installation

Attackers are everywhere! They try to abuse victims using new communication channels and social engineering techniques! Somebody pointed my to the following Tik-Tok video:...

Patch Tuesday, October 2025 ‘End of 10’ Edition – Krebs on Security

Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least two vulnerabilities that are...

The AI hype train, space data centers, and lifelike robot heads • Graham Cluley

In episode 72 of The AI Fix, GPT-5’s “secret sauce” turns out to be phrases from...

Oak Cliff Swipers – Darknet Diaries

Full Transcript He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens...

A Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI...

Troy Hunt: Weekly Update 473

This week's video was recorded on Friday morning Aussie time, and as...

WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started...

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

Oct 10, 2025Ravie LakshmananRansomware / Data Theft Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable...

Recent articles