Cybersecurity

Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365 – Sophos News

Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants...

ThrottleStop driver abused to terminate AV processes

Introduction In a recent incident response case in Brazil, we spotted intriguing new antivirus (AV) killer software that has been circulating in the wild since...

Mass Internet Scanning from ASN 43350 [Guest Diary]

During the last three months I've had a DShield sensor online and collecting data from a deployment in AWS. This week I did some...

Scammers Unleash Flood of Slick Online Gaming Sites – Krebs on Security

Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with...

Red flags, leaked chats, and a final farewell • Graham Cluley

The viral women-only dating safety app Tea, built to flag red flags, gets flagged itself –...

I’m the Real Connor – Darknet Diaries

Full Transcript One day Connor Tumbleson got an email saying his identity has been stolen. And this was one of the...

Is your phone spying on you?

Here's what you need to know about the inner workings of modern...

Weekly Update 462

This will be the title of the blog post: "Court Injunctions are the Thoughts and Prayers of Data Breach Response". It's got a nice...

GOLD BLADE remote DLL sideloading attack deploys RedLoader – Sophos News

Sophos analysts are investigating a new infection chain for the GOLD BLADE cybercriminal group’s custom RedLoader malware, which initiates command and control (C2) communications....

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Jul 31, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw in "Alone – Charity Multipurpose Non-profit WordPress Theme" to...

Sophos’ Secure by Design 2025 Progress – Sophos News

In 2024, we became one of the first organizations to commit to CISA’s Secure by Design initiative. Aligned with our core organizational values around...

Analysis of the ToolShell vulnerabilities and exploit code

On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of on-premise SharePoint servers. According to the reports, observed...

Recent articles