Cybersecurity

BladedFeline: Whispering in the dark

In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT...

Weekly Update 455

The bot-fighting is a non-stop battle. In this week's video, I discuss how we're tweaking Cloudflare Turnstile and combining more attributes around how bot-like...

When cybercriminals eat their own – Sophos News

At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

Jun 09, 2025Ravie LakshmananGovernment Security / Cyber Espionage The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of partially-related intrusions...

NICKEL TAPESTRY expands fraudulent worker operations – Sophos News

With this post, the X-Ops blog is thrilled to present research from our Sophos siblings newly joining us from Secureworks, of which CTU (the...

New Mirai botnet campaign targets DVR devices

The abuse of known security flaws to deploy bots on vulnerable systems is a widely recognized problem. Many automated bots constantly search the web...

Upcoming DShield Honeypot Changes and Customizations

There are some upcoming DShield honeypot changes that introduce some opportunities for additional customization and data analysis. For most users, no additional actions...

An AI uses blackmail to save itself, and threats make AIs work better • Graham Cluley

In episode 53 of The AI Fix, our hosts suspect the CEO of Duolingo has been...

Vastaamo – Darknet Diaries

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...

Don’t let dormant accounts become a doorway for cybercriminals

Do you have online accounts you haven't used in years? If so,...

Troy Hunt: Weekly Update 454

We're two weeks in from the launch of the new HIBP, and...

What cybercriminals do with their money (Part 5) – Sophos News

Content warning: Because of the nature of some of the activities we discovered, this series of articles contains content that some readers may find...

Recent articles