Cybersecurity

Safeguarding business data with encryption

As the attack surface expands and the threat landscape grows more complex,...

Troy Hunt: Weekly Update 468

I only just realised, as I prepared this accompanying blog post, that...

Threat Intelligence Executive Report – Volume 2025, Number 4 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™...

Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys

Sep 06, 2025Ravie LakshmananSoftware Security / Cryptocurrency A new set of four malicious packages have been discovered in the npm package registry with capabilities to...

Mobile cyberthreat report for Q2 2025

IT threat evolution in Q2 2025. Mobile statisticsIT threat evolution in Q2 2025. Non-mobile statistics The mobile section of our quarterly cyberthreat report includes statistics...

Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086

When I am thinking about the security of manufacturing environments, I am usually focusing on IoT devices integrated into production lines. All the little...

The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security

The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction...

Hacker suspected of trying to cheat his way into university is arrested in Spain

Spanish police have arrested a suspected hacker for accessing a government website in order to alter the high school and university entrance exam grades...

Welcome To Video – Darknet Diaries

Full Transcript Andy Greenberg brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to...

This month in security with Tony Anscombe – August 2025 edition

From Meta shutting down millions of WhatsApp accounts linked to scam centers...

Home Assistant + Ubiquiti + AI = Home Automation Magic

It seems like every manufacturer of anything electrical that goes in the...

Velociraptor incident response tool abused for remote access – Sophos News

In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital forensics and incident response...

Recent articles