Cybersecurity

Our CISO’s view of Pacific Rim – Sophos News

Sophos is not the first cybersecurity vendor to find its perimeter products the target of sustained nation-state attack. If anything is special about the...

What “Nigerian” spam looks like in the mid-2020s

“Nigerian” spam is a collective term for messages designed to entice victims with alluring offers and draw them into an email exchange with scammers,...

Crypto Wallet Scam: Not For Free

I did some research into multisig wallets (cfr "Crypto Wallet Scam"), and discovered that setting up such a wallet on the TRON network comes...

Teen on Musk’s DOGE Team Graduated from ‘The Com’ – Krebs on Security

Wired reported this week that a 19-year-old working for Elon Musk‘s so-called Department of Government Efficiency (DOGE) was given access to sensitive US government...

Research Reveals Data Breaches On The Rise at UK Law Firms

British legal professionals have seen a "significant surge" in data breaches, according to new research from NetDocuments, a firm that provides a cloud-based content...

Hijacked Line – Darknet Diaries

Full Transcript Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how...

Evasive Panda scouting cloud services

In this blogpost, we provide a technical analysis of CloudScout, a post-compromise toolset used by Evasive Panda to target a...

Weekly Update 437

It's IoT time! We're embarking on a very major home project (more detail of which is in the video), and some pretty big decisions...

Cybercriminals still not fully on board the AI train (yet) – Sophos News

In November 2023, Sophos X-Ops published research exploring threat actors’ attitudes towards generative AI, focusing on discussions on selected cybercrime forums. While we did...

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

Feb 01, 2025Ravie LakshmananCybercrime / Fraud Prevention U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

To Simulate or Replicate: Crafting Cyber Ranges

The Good Stuff First This tool is being shared (calling it a tool is generous) due to the number of times last year I had...

Recent articles