Cybersecurity

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

May 03, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that...

Outlaw botnet detected in an incident contained by Kaspersky

Introduction In a recent incident response case in Brazil, we dealt with a relatively simple, yet very effective threat focused on Linux environments. Outlaw (also...

Steganography Analysis With pngdump.py: Bitstreams

A friend asked me if my pngdump.py tool can extract individual bits from an image (cfr. diary entry "Steganography Analysis With pngdump.py"). It can not....

Hacking hijinks at the hospital, and WASPI scams • Graham Cluley

He’s not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of...

Revenge Bytes – Darknet Diaries

Full Transcript Madison’s nude photos were posted online. Her twin sister Christine came to help. This begins a bizarre and uneasy...

How safe and secure is your iPhone really?

Your iPhone isn't necessarily as invulnerable to security threats as you may...

Troy Hunt: Weekly Update 449

Today, I arrived at my PC first thing in the morning to...

Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream – Sophos News

Late in January 2025, a Managed Service Provider (MSP) administrator received a well-crafted phishing email containing what appeared to be an authentication alert for...

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing...

Cybercrime on Main Street 2025 – Sophos News

Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in...

Lazarus APT updates its toolset in watering hole attacks

We have been tracking the latest attack campaign by the Lazarus group since last November, as it targeted organizations in South Korea with a...

Honeypot Iptables Maintenance and DShield-SIEM Logging

In the last week I ran into some issues that I hadn't anticipated: Residential IP changed, some honeypots inacessible remotely Rebuilit DShield-SIEM , Zeek logs not...

Recent articles