Cybersecurity

Weekly Update 484

I think the start of this week's video really nailed it for the techies amongst us: shit doesn't work, you change something random and...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

The HoneyMyte APT now protects malware with a kernel-mode rootkit

Overview of the attacks In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old,...

Positive trends related to public IP ranges from the year 2025

Since the end of the year is quickly approaching, it is undoubtedly a good time to look back at what the past twelve months...

Happy 16th Birthday, KrebsOnSecurity.com! – Krebs on Security

KrebsOnSecurity.com celebrates its 16th anniversary today! A huge “thank you” to all of our readers — newcomers, long-timers and drive-by critics alike. Your engagement...

Santa Claus doesn’t exist (according to AI) • Graham Cluley

Is Santa Claus real? This Christmas special of The AI Fix podcast sets out to answer...

Threatlocker – Darknet Diaries

A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by...

What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be...

Troy Hunt: Weekly Update 483

Building out an IoT environment is a little like the old Maslow's...

I am not a robot: ClickFix used to deploy StealC and Qilin

ClickFix is an increasingly common tactic used by threat actors to install malicious software on victims’ devices. It has gone through a number of...

Recent articles