Cybersecurity

Troy Hunt: Weekly Update 454

We're two weeks in from the launch of the new HIBP, and...

What cybercriminals do with their money (Part 5) – Sophos News

Content warning: Because of the nature of some of the activities we discovered, this series of articles contains content that some readers may find...

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

May 31, 2025Ravie LakshmananVulnerability / Linux Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat...

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News

Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...

Evolution of Zanubis, a banking Trojan for Android

Introduction Zanubis is a banking Trojan for Android that emerged in mid-2022. Since its inception, it has targeted banks and financial entities in Peru, before...

Alternate Data Streams ? Adversary Defense Evasion and Detection [Guest Diary]

Introduction Adversaries are leveraging alternate data streams to hide malicious data with the intent of evading detection. Numerous different malicious software has been designed to...

Adidas customers’ personal information at risk after data breach

Lovers of Adidas clothes would be wise to be on their guard against phishing attacks, after the German sportswear giant revealed that a cyber...

The Mimics of Punjab – Darknet Diaries

Full Transcript This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a...

Danabot under the microscope

ESET Research has been tracking Danabot’s activity since 2018 as part of...

Have I Been Pwned 2.0 is Now Live!

This has been a very long time coming, but finally, after a...

DragonForce targets rivals in a play for dominance – Sophos News

DragonForce is not just another ransomware brand – it’s a destabilizing force trying to reshape the ransomware landscape. Counter Threat Unit (CTU) researchers are...

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025Ravie LakshmananVulnerability / Threat Intelligence A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution vulnerability...

Recent articles