Cybersecurity

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with...

Inside the Synthient Threat Data

Where is your data on the internet? I mean, outside the places...

Threat Intelligence Executive Report – Volume 2025, Number 5 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™...

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications...

Notable email phishing techniques in 2025

Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat actors keep coming up with new methods to bypass security filters and circumvent...

Many Online Services and Websites Affected by an AWS Outage

previousMy next class:Reverse-Engineering Malware: Advanced Code AnalysisOnline | Greenwich Mean TimeOct 27th - Oct 31st 2025 Many Online Services and Websites...

Email Bombs Exploit Lax Authentication in Zendesk – Krebs on Security

Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing messages that come...

Operation Heracles strikes blow against massive network of fraudulent crypto trading sites

In a significant crackdown against online cybercriminals, German authorities have successfully dismantled a network of fraudulent cryptocurrency investment sites that has targeted millions of...

Gollumfun (Part 1) – Darknet Diaries

Full Transcript Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story...

Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware,...

Troy Hunt: Weekly Update 473

This week's video was recorded on Friday morning Aussie time, and as...

WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started...

Recent articles