Cybersecurity

Crypto Wallet Scam: Not For Free

I did some research into multisig wallets (cfr "Crypto Wallet Scam"), and discovered that setting up such a wallet on the TRON network comes...

Teen on Musk’s DOGE Team Graduated from ‘The Com’ – Krebs on Security

Wired reported this week that a 19-year-old working for Elon Musk‘s so-called Department of Government Efficiency (DOGE) was given access to sensitive US government...

Research Reveals Data Breaches On The Rise at UK Law Firms

British legal professionals have seen a "significant surge" in data breaches, according to new research from NetDocuments, a firm that provides a cloud-based content...

Hijacked Line – Darknet Diaries

Full Transcript Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how...

Evasive Panda scouting cloud services

In this blogpost, we provide a technical analysis of CloudScout, a post-compromise toolset used by Evasive Panda to target a...

Weekly Update 437

It's IoT time! We're embarking on a very major home project (more detail of which is in the video), and some pretty big decisions...

Cybercriminals still not fully on board the AI train (yet) – Sophos News

In November 2023, Sophos X-Ops published research exploring threat actors’ attitudes towards generative AI, focusing on discussions on selected cybercrime forums. While we did...

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

Feb 01, 2025Ravie LakshmananCybercrime / Fraud Prevention U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

To Simulate or Replicate: Crafting Cyber Ranges

The Good Stuff First This tool is being shared (calling it a tool is generous) due to the number of times last year I had...

Blending in with the Cloud – Krebs on Security

Image: Shutterstock, ArtHead. In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and...

Hackers get hacked, the British Museum IT shutdown, and social media kidnaps • Graham Cluley

What happens when eager computer enthusiasts unknowingly download a trojanized hacking tool and find themselves on...

Recent articles