Cybersecurity

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

Feb 01, 2025Ravie LakshmananCybercrime / Fraud Prevention U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

To Simulate or Replicate: Crafting Cyber Ranges

The Good Stuff First This tool is being shared (calling it a tool is generous) due to the number of times last year I had...

Blending in with the Cloud – Krebs on Security

Image: Shutterstock, ArtHead. In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and...

Hackers get hacked, the British Museum IT shutdown, and social media kidnaps • Graham Cluley

What happens when eager computer enthusiasts unknowingly download a trojanized hacking tool and find themselves on...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Tony Fadell: Innovating to save our planets

We Live Science As methane emissions come under heightened global scrutiny, learn how...

Weekly Update 436

We're heading back to London! And making a trip to Reykjavik. And Dublin. I talked about us considering this in the video yesterday, and...

Gootloader inside out – Sophos News

... That hidden element had links (selected with green) and the matching targeted search terms (selected with brown): This hidden element will not be visible to...

Over 100 Security Flaws Found in LTE and 5G Network Implementations

Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that...

Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” – Sophos News

Sophos X-Ops’ Managed Detection and Response (MDR) is actively responding to incidents tied to two separate groups of threat actors, each of which have...

A closer look at the Mercedes-Benz infotainment system security

Introduction This report covers the research of the Mercedes-Benz Head Unit, which was made by our team. Mercedes-Benz’s latest Head Unit (infotainment system) is called...

Recent articles