Cybersecurity

Targeted attacks leverage accounts on popular online platforms as C2 servers

Introduction In the latter half of 2024, the Russian IT industry, alongside a number of entities in other countries, experienced a notable cyberattack. The attackers...

Triage is Key! Python to the Rescue!

When you need to quickly analyze a lot of data, there is one critical step to perform: Triage. In forensic investigations, this step is...

Phishers Target Aviation Execs to Scam Customers – Krebs on Security

KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending...

Free decryptor for victims of Phobos ransomware released

There is good news for any organisation which has been hit by the Phobos ransomware. Japanese police have released a free decryptor capable of recovering...

Grifter – Darknet Diaries

Full Transcript Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days...

Why is your data worth so much?

Behind every free online service, there's a price being paid. Learn why...

11 Years of Microsoft Regional Director and 15 Years of MVP

I often wonder how much people in other professions genuinely love the...

The revitalization of small AI models for cybersecurity – Sophos News

The last few months and years have seen a wave of AI integration across multiple sectors, driven by new technology and global enthusiasm. There...

How to Advance from SOC Manager to CISO?

Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not...

Recent articles