Cybersecurity

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

GOFFEE’s recent attacks: new tools and techniques

GOFFEE is a threat actor that first came to our attention in early 2022. Since then, we have observed malicious activities targeting exclusively entities...

xorsearch.py: Searching With Regexes, (Mon, Apr 14th)

As promised in diary entry "XORsearch: Searching With Regexes", I will outline another method to search with xorsearch and regexes. In stead of XORsearch.exe, the...

Ransomware Reaches A Record High, But Payouts Are Dwindling

Shed a tear, if you can, for the poor, misunderstood cybercriminals hard at work trying to earn a dishonest crust by infecting organisations with...

Axact – Darknet Diaries

Full Transcript Axact sells fake diplomas and degrees. What could go wrong with this business plan? Support for this episode comes from...

Watch out for these traps lurking in search results

Here’s how to avoid being hit by fraudulent websites that scammers can...

Weekly Update 446

After an unusually long day of travelling from Iceland, we've finally made it to the land of Guinness, Leprechauns, and a tax haven for...

Industrial-strength April Patch Tuesday covers 135 CVEs – Sophos News

Microsoft on Tuesday released 135 patches affecting 19 product families. Ten of the addressed issues, all remote code execution issues, are considered by Microsoft...

Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw

Apr 08, 2025Ravie LakshmananNetwork Security / Vulnerability Fortinet has released security updates to address a critical security flaw impacting FortiSwitch that could permit an attacker...

The 2025 Sophos Active Adversary Report – Sophos News

The Sophos Active Adversary Report celebrates its fifth anniversary this year. The report grew out of a simple question: What happens after attackers breach...

Accessing the MS-NRPC interface as the RPC client without authentication

In the first part of our research, I demonstrated how we revived the concept of no authentication (null session) after many years. This involved...

Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive [Guest Diary]

For the last 5 months, as part of my BACS internship with SANS, I have monitored two deployments of a DShield Sensor, sometimes referred...

Recent articles