Cybersecurity

Lazarus APT updates its toolset in watering hole attacks

We have been tracking the latest attack campaign by the Lazarus group since last November, as it targeted organizations in South Korea with a...

Honeypot Iptables Maintenance and DShield-SIEM Logging

In the last week I ran into some issues that I hadn't anticipated: Residential IP changed, some honeypots inacessible remotely Rebuilit DShield-SIEM , Zeek logs not...

An AI is the best computer programmer in the world • Graham Cluley

In episode 47 of The AI Fix, o3 becomes the best competitive programmer in the world,...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Look out! CapCut copycats are on the prowl

Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to...

Weekly Update 447

I'm home! Well, for a day, then it's off to the other side of the country (which I just flew over last night on...

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported...

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

Recent articles