Cybersecurity

Weekly Update 482

Perhaps it's just the time of year where we all start to wind down a bit, or maybe I'm just tired after another massive...

Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations – Sophos News

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Dec 13, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink...

Sophos achieves its best-ever results in the MITRE ATT&CK Enterprise 2025 Evaluation – Sophos News

MITRE ATT&CK® Evaluations are among the world’s most rigorous independent security tests. They emulate the tactics, techniques, and procedures (TTPs) used by real-world adversaries...

Where does the data stolen in a phishing attack go?

Introduction A typical phishing attack involves a user clicking a fraudulent link and entering their credentials on a scam website. However, the attack is far...

Using AI Gemma 3 Locally with a Single CPU

Several months ago, I got a Nucbox K8 Plus minicomputer to use as a Proxmox 9 server. At the time of this acquisition, I...

Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of...

California man admits role in $263 million cryptocurrency theft that funded lavish lifestyle

A 22-year-old from Newport Beach, California has pleaded guilty to his role in a sophisticated criminal network that stole approximately US $263 million in...

Maxie – Darknet Diaries

Full Transcript Maxie Reynolds loves an adventure, especially the kind where she’s breaking into buildings (legally). In this episode, she shares stories...

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at...

Weekly Update 481

Twelve years (and one day) since launching Have I Been Pwned, it's now a service that Charlotte and I live and breathe every day....

GOLD BLADE’s strategic evolution – Sophos News

Between February 2024 and August 2025, Sophos analysts investigated nearly 40 intrusions related to  STAC6565, a campaign the analysts assess with high confidence is...

Recent articles