Cybersecurity

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

Aug 19, 2025Ravie LakshmananSupply Chain Security The maintainers of the Python Package Index (PyPI) repository have announced that the package manager now checks for expired...

Phishing and scams: how fraudsters are deceiving users in 2025

Introduction Phishing and scams are dynamic types of online fraud that primarily target individuals, with cybercriminals constantly adapting their tactics to deceive people. Scammers invent...

Sniffing and Injecting 5G Traffic Without Rogue Base Stations

As the world gradually adopts and transitions to using 5G for mobile, operational technology (OT), automation and Internet-of-Things (IoT) devices, a secure 5G network...

Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme – Krebs on Security

Cybercriminal groups peddling sophisticated phishing kits that convert stolen card data into mobile wallets have recently shifted their focus to targeting customers of brokerage...

Poisoned Calendar invites, ChatGPT, and Bromide • Graham Cluley

A poisoned Google Calendar invite that can hijack your smart home, a man is hospitalised after...

Hieu – Darknet Diaries

Full Transcript All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found...

WinRAR zero-day exploited in espionage attacks against high-value targets

The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics...

Weekly Update 464

I think the most amusing comment I had during this live stream was one to the effect of expecting me to have all my...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious...

Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack...

Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365 – Sophos News

Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants...

ThrottleStop driver abused to terminate AV processes

Introduction In a recent incident response case in Brazil, we spotted intriguing new antivirus (AV) killer software that has been circulating in the wild since...

Recent articles