Cybersecurity

Veeam Phishing via Wav File

A interesting phishing attempt was reported by a contact. It started with a simple email that looked like a voice mail notification like many...

Choo Choo Choose to ignore the vulnerability • Graham Cluley

In episode 426 of the “Smashing Security” podcast, Graham reveals how you can hijack a train’s...

MG – Darknet Diaries

Full Transcript In this episode we talk with MG (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG...

Navigating the labyrinth of forks

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into...

Weekly Update 460

This week's update is the last remote one for a while as we wind up more than a month of travel. I'm pushing this...

July Patch Tuesday offers 127 fixes – Sophos News

Microsoft on Tuesday released 127 patches affecting 14 product families. Nine of the addressed issues — four involving Windows, two involving 365 and Office,...

New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

Jul 12, 2025Ravie LakshmananAI Security / Vulnerability NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of...

The Solidity Language open-source package was used in a $500,000 crypto heist

Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected...

SSH Tunneling in Action: direct-tcp requests [Guest Diary]

As part of the SANS degree program curriculum, I had the opportunity to set up a honeypot to monitor log activities mimicking a vulnerable...

From pew-pew to pwned • Graham Cluley

In episode 425 of “Smashing Security”, Graham reveals how “Call of Duty: WWII” has been weaponised...

Greg – Darknet Diaries

Full Transcript Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Recent articles