Cybersecurity

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

Nov 01, 2025Ravie LakshmananArtificial Intelligence / Vulnerability The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE...

Phundamental or pholly? – Sophos News

On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines:...

BlueNoroff’s latest campaigns: GhostCall and GhostHire

Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38, Alluring Pisces, Stardust Chollima, and TA444) has adopted new infiltration strategies...

How to collect memory-only filesystems on Linux systems

I've been doing Unix/Linux IR and Forensics for a long time. I logged into a Unix system for the first time in 1983. That's...

Canada Fines Cybercrime Friendly Cryptomus $176M

Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges...

How to hack a prison, and the hidden threat of online checkouts • Graham Cluley

A literal insider threat: we head to a Romanian prison where “self-service” web kiosks allowed inmates...

Maddie – Darknet Diaries

Full Transcript Maddie Stone is a security researcher for Google’s Project Zero. In this episode we hear what it’s like battling...

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with...

Inside the Synthient Threat Data

Where is your data on the internet? I mean, outside the places...

Threat Intelligence Executive Report – Volume 2025, Number 5 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™...

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications...

Notable email phishing techniques in 2025

Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat actors keep coming up with new methods to bypass security filters and circumvent...

Recent articles