Cybersecurity

DeceptiveDevelopment targets freelance developers

Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers....

We’re Backfilling and Cleaning Stealer Logs in Have I Been Pwned

I think I've finally caught my breath after dealing with those 23...

Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS – Sophos News

Back in August 2022, Sophos X-Ops published a white paper on multiple attackers – that is, adversaries targeting the same organizations multiple times. One...

Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists

Mar 03, 2025Ravie Lakshmanan This week, a 23-year-old Serbian activist found themselves at the crossroads of digital danger when a sneaky zero-day exploit turned their...

Kaspersky SOC analyzes an incident involving a web shell used as a backdoor

Web shells have evolved far beyond their original purpose of basic remote command execution, and many now function more like lightweight exploitation frameworks. These...

Njrat Campaign Using Microsoft Dev Tunnels

I spotted new  Njrat samples that (ab)use the Microsoft dev tunnels service to connect to their C2 servers. This is a service that allows developers...

U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security

A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and...

History’s biggest heist just happened, and online abuse • Graham Cluley

In episode 406 of the “Smashing Security” podcast, we explore how the cryptocurrency exchange Bybit has...

Rachel – Darknet Diaries

Full Transcript Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a...

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims'...

Troy Hunt: Weekly Update 439

We're now eyeball-deep into the HIBP rebrand and UX work, totally overhauling...

Scalable Vector Graphics files pose a novel phishing threat – Sophos News

Criminals who conduct phishing attacks over email have ramped up their abuse of a new threat vector designed to bypass existing anti-spam and anti-phishing...

Recent articles