Cybersecurity

Troy Hunt: Weekly Update 483

Building out an IoT environment is a little like the old Maslow's...

I am not a robot: ClickFix used to deploy StealC and Qilin

ClickFix is an increasingly common tactic used by threat actors to install malicious software on victims’ devices. It has gone through a number of...

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

Dec 24, 2025Ravie LakshmananMalware / Endpoint Security Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that's delivered by means...

I am not a robot: ClickFix used to deploy StealC and Qilin

ClickFix is an increasingly common tactic used by threat actors to install malicious software on victims’ devices. It has gone through a number of...

New Cloud Atlas APT campaign

Known since 2014, the Cloud Atlas group targets countries in Eastern Europe and Central Asia. Infections occur via phishing emails containing a malicious document...

DLLs & TLS Callbacks – SANS Internet Storm Center

Xavier's diary entry "Abusing DLLs EntryPoint for the Fun" inspired me to do some tests with TLS Callbacks and DLLs. TLS stands for Thread Local...

Most Parked Domains Now Serving Malicious Content – Krebs on Security

Direct navigation — the act of visiting a website by manually typing a domain name in a web browser — has never been riskier:...

The Kindle that got pwned • Graham Cluley

Think your Kindle is harmless? Think again! In this episode, we unpack a Black Hat Europe...

Ola – Darknet Diaries

Full Transcript In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find...

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET...

Weekly Update 482

Perhaps it's just the time of year where we all start to wind down a bit, or maybe I'm just tired after another massive...

Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations – Sophos News

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

Recent articles