Cybersecurity

Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365 – Sophos News

Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants...

Kaspersky Security Bulletin 2025. Statistics

All statistics in this report come from Kaspersky Security Network (KSN), a global cloud service that receives information from components in our security solutions...

[Guest Diary] Hunting for SharePoint In-Memory ToolShell Payloads

. In July 2025, many of us were introduced to the Microsoft SharePoint exploit chain known as ToolShell. ToolShell exploits the deserialization and authentication bypass...

State-backed spyware attacks are targeting Signal and WhatsApp users, CISA warns

CISA, the US Cybersecurity and Infrastructure Security Agency, has issued a new warning that cybercriminals and state-backed hacking groups are using spyware to compromise...

Grifter – Darknet Diaries

Full Transcript Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days...

What parents should know to protect their children from doxxing

Online disagreements among young people can easily spiral out of control. Parents...

Weekly Update 479

I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and...

WhatsApp compromise leads to Astaroth deployment – Sophos News

Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked...

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Nov 25, 2025Ravie LakshmananData Exposure / Cloud Security New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are...

Advancing Cybersecurity for Microsoft Environments – Sophos News

I’m pleased to share three significant updates that advance cybersecurity for organizations that rely on Microsoft technologies. These milestones expand the reach of Sophos’...

ToddyCat APT’s new tools and techniques

Introduction Email remains the main means of business correspondence at organizations. It can be set up either using on-premises infrastructure (for example, by deploying Microsoft...

Use of CSS stuffing as an obfuscation technique?

From time to time, it can be instructive to look at generic phishing messages that are delivered to one’s inbox or that are caught...

Recent articles