Cybersecurity

WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started...

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

Oct 10, 2025Ravie LakshmananRansomware / Data Theft Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable...

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

Developing a machine-learning model to detect DLL hijacking

DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used...

Exploit Against FreePBX (CVE-2025-57819) with code execution.

FreePBX is a popular PBX system built around the open source VoIP system Asterisk. To manage Asterisk more easily, it provides a capable web-based...

Bulletproof Host Stark Industries Evades EU Sanctions – Krebs on Security

In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks...

Ransomware attack leaves nation days away from Asahi beer shortage

Beer lovers will be sobbing into their pints at the news that a ransomware attack has brought Japan's largest brewer to its knees and...

Kill List – Darknet Diaries

Full Transcript The dark web is full of mystery. Some of it’s just made up though. Chris Monteiro wanted to see...

How SMBs can fight back against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are...

Welcoming CERN to Have I Been Pwned

It's hard to explain the significance of CERN. It's the birthplace of...

HeartCrypt’s wholesale impersonation effort – Sophos News

Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes: Malware impersonating, subverting, and...

$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections

A group of academics from KU Leuven and the University of Birmingham has demonstrated a new vulnerability called Battering RAM to bypass the latest...

Recent articles