Cybersecurity

5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between...

Weekly Update 476

The 2 billion email address stealer log breach I talk about this week is almost ready to go at the time of writing. It's...

BRONZE BUTLER exploits Japanese asset management software vulnerability – Sophos News

In mid-2025, Counter Threat Unit™ (CTU) researchers observed a sophisticated BRONZE BUTLER campaign that exploited a zero-day vulnerability in Motex LANSCOPE Endpoint Manager to...

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

Nov 01, 2025Ravie LakshmananArtificial Intelligence / Vulnerability The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE...

Phundamental or pholly? – Sophos News

On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines:...

BlueNoroff’s latest campaigns: GhostCall and GhostHire

Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38, Alluring Pisces, Stardust Chollima, and TA444) has adopted new infiltration strategies...

How to collect memory-only filesystems on Linux systems

I've been doing Unix/Linux IR and Forensics for a long time. I logged into a Unix system for the first time in 1983. That's...

Canada Fines Cybercrime Friendly Cryptomus $176M

Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges...

How to hack a prison, and the hidden threat of online checkouts • Graham Cluley

A literal insider threat: we head to a Romanian prison where “self-service” web kiosks allowed inmates...

Maddie – Darknet Diaries

Full Transcript Maddie Stone is a security researcher for Google’s Project Zero. In this episode we hear what it’s like battling...

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with...

Inside the Synthient Threat Data

Where is your data on the internet? I mean, outside the places...

Recent articles