Cybersecurity

The future of MFA is clear – but is it here yet? – Sophos News

Over the years the industry has tied itself in knots in its attempts at augmenting (or upgrading) the password, using all sorts of confusing...

UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools

Mar 21, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in...

New Arcane stealer spreading via YouTube and Discord

At the end of 2024, we discovered a new stealer distributed via YouTube videos promoting game cheats. What’s intriguing about this malware is how...

Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440

In September, Cisco published an advisory noting two vulnerabilities : CVE-2024-20439: Cisco Smart Licensing Utility Static Credential Vulnerability CVE-2024-20440: Cisco Smart Licensing Utility Information Disclosure Vulnerability These...

How to Infect Your PC in Three Easy Steps – Krebs on Security

A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed “ClickFix,” the visitor to...

Free file converter malware scam “rampant” claims FBI

Whether you're downloading a video from YouTube or converting a Word document into a PDF file, there's a chance that you might be unwittingly...

Jim Hates Scams – Darknet Diaries

Full Transcript Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his...

No, you’re not fired – but beware of job termination scams

Some employment scams take an unexpected turn as cybercriminals shift from “hiring”...

Soft-Launching and Open Sourcing the Have I Been Pwned Rebrand

Designing the first logo for Have I Been Pwned was easy: I...

Little fires everywhere for March Patch Tuesday – Sophos News

Microsoft on Tuesday released 57 patches affecting 10 product families. Six of the addressed issues are considered by Microsoft to be of Critical severity,...

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack

Mar 12, 2025Ravie LakshmananCloud Security / Vulnerability Threat intelligence firm GreyNoise is warning of a "coordinated surge" in the exploitation of Server-Side Request Forgery (SSRF)...

New wave of attacks on gamers with DCRat backdoor

Since the beginning of the year, we’ve been tracking in our telemetry a new wave of DCRat distribution, with paid access to the backdoor...

Recent articles