Cybersecurity

NICKEL TAPESTRY expands fraudulent worker operations – Sophos News

With this post, the X-Ops blog is thrilled to present research from our Sophos siblings newly joining us from Secureworks, of which CTU (the...

New Mirai botnet campaign targets DVR devices

The abuse of known security flaws to deploy bots on vulnerable systems is a widely recognized problem. Many automated bots constantly search the web...

Upcoming DShield Honeypot Changes and Customizations

There are some upcoming DShield honeypot changes that introduce some opportunities for additional customization and data analysis. For most users, no additional actions...

An AI uses blackmail to save itself, and threats make AIs work better • Graham Cluley

In episode 53 of The AI Fix, our hosts suspect the CEO of Duolingo has been...

Vastaamo – Darknet Diaries

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...

Don’t let dormant accounts become a doorway for cybercriminals

Do you have online accounts you haven't used in years? If so,...

Troy Hunt: Weekly Update 454

We're two weeks in from the launch of the new HIBP, and...

What cybercriminals do with their money (Part 5) – Sophos News

Content warning: Because of the nature of some of the activities we discovered, this series of articles contains content that some readers may find...

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

May 31, 2025Ravie LakshmananVulnerability / Linux Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat...

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News

Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...

Evolution of Zanubis, a banking Trojan for Android

Introduction Zanubis is a banking Trojan for Android that emerged in mid-2022. Since its inception, it has targeted banks and financial entities in Peru, before...

Alternate Data Streams ? Adversary Defense Evasion and Detection [Guest Diary]

Introduction Adversaries are leveraging alternate data streams to hide malicious data with the intent of evading detection. Numerous different malicious software has been designed to...

Recent articles