Cybersecurity

Troy Hunt: Passkeys for Normal People

Let me start by very simply explaining the problem we're trying to...

Finding Minhook in a sideloading attack – and Sweden too – Sophos News

Late in 2023 and during the first half of 2024, we monitored an attack campaign targeting several of our customers in multiple locations. Though...

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

May 03, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that...

Outlaw botnet detected in an incident contained by Kaspersky

Introduction In a recent incident response case in Brazil, we dealt with a relatively simple, yet very effective threat focused on Linux environments. Outlaw (also...

Steganography Analysis With pngdump.py: Bitstreams

A friend asked me if my pngdump.py tool can extract individual bits from an image (cfr. diary entry "Steganography Analysis With pngdump.py"). It can not....

Hacking hijinks at the hospital, and WASPI scams • Graham Cluley

He’s not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of...

Shannen – Darknet Diaries

Full Transcript Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The...

How safe and secure is your iPhone really?

Your iPhone isn't necessarily as invulnerable to security threats as you may...

Troy Hunt: Weekly Update 449

Today, I arrived at my PC first thing in the morning to...

Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream – Sophos News

Late in January 2025, a Managed Service Provider (MSP) administrator received a well-crafted phishing email containing what appeared to be an authentication alert for...

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing...

Cybercrime on Main Street 2025 – Sophos News

Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in...

Recent articles