Cybersecurity

Full Transcript In this episode we talk with MG (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities. Learn more about...
AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of forks and variants. While its capabilities are not...

Weekly Update 460

This week's update is the last remote one for a while as we wind up more than a month of travel. I'm pushing this...

July Patch Tuesday offers 127 fixes – Sophos News

Microsoft on Tuesday released 127 patches affecting 14 product families. Nine of the addressed issues — four involving Windows, two involving 365 and Office,...

New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

Jul 12, 2025Ravie LakshmananAI Security / Vulnerability NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of...

The Solidity Language open-source package was used in a $500,000 crypto heist

Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected...

SSH Tunneling in Action: direct-tcp requests [Guest Diary]

As part of the SANS degree program curriculum, I had the opportunity to set up a honeypot to monitor log activities mimicking a vulnerable...

From pew-pew to pwned • Graham Cluley

In episode 425 of “Smashing Security”, Graham reveals how “Call of Duty: WWII” has been weaponised...

Greg – Darknet Diaries

Full Transcript Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Welcoming Truyu to Have I Been Pwned’s Partner Program

I always used to joke that when people used Have I Been...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors

Jul 04, 2025Ravie LakshmananZero-Day / Cyber Espionage Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle (aka APT-Q-95) that has been...

Recent articles