Cybersecurity

Welcoming Truyu to Have I Been Pwned’s Partner Program

I always used to joke that when people used Have I Been...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors

Jul 04, 2025Ravie LakshmananZero-Day / Cyber Espionage Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle (aka APT-Q-95) that has been...

Scans for Ichano AtHome IP Cameras

Ichano's "AtHome Camera" is a bit of a different approach to home surveillance cameras . Instead of a hardware camera solution, this product is...

AI is the best hacker in the USA, and self-learning AI • Graham Cluley

In episode 57 of The AI Fix, our hosts discover an AI “dream recorder”, Mark Zuckerberg...

The D.R. Incident – Darknet Diaries

Full Transcript Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks...

This month in security with Tony Anscombe – June 2025 edition

From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack,...

Troy Hunt: Weekly Update 457

Firstly, apologies for the annoying clipping in the audio. I use a...

Taking the shine off BreachForums – Sophos News

On June 25, 2025, French authorities announced that four members of the ShinyHunters (also known as ShinyCorp) cybercriminal group were arrested in multiple French...

Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks

Jun 26, 2025Ravie LakshmananOpen Source / Vulnerability Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry ("open-vsxorg") that, if successfully exploited, could...

Kaspersky 2025 SMB threat report

Cyberattackers often view small and medium-sized businesses (SMBs) as easier targets, assuming their security measures are less robust than those of larger enterprises. In...

Recent articles