Cybersecurity

Phishers Target Aviation Execs to Scam Customers – Krebs on Security

KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending...

Free decryptor for victims of Phobos ransomware released

There is good news for any organisation which has been hit by the Phobos ransomware. Japanese police have released a free decryptor capable of recovering...

Deviant – Darknet Diaries

Full Transcript Deviant Ollam is a physical penetration specialist. That means he’s paid to break into buildings to see if the...

Why is your data worth so much?

Behind every free online service, there's a price being paid. Learn why...

11 Years of Microsoft Regional Director and 15 Years of MVP

I often wonder how much people in other professions genuinely love the...

SharePoint ‘ToolShell’ vulnerabilities being exploited in the wild – Sophos News

On July 18, 2025, Sophos MDR (Managed Detection and Response) analysts observed an influx of malicious activity targeting on-premises SharePoint instances, including malicious PowerShell...

PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse

Jul 21, 2025Ravie LakshmananThreat Intelligence / Authentication Cybersecurity researchers have disclosed a novel attack technique that allows threat actors to bypass Fast IDentity Online (FIDO)...

GhostContainer backdoor for Exchange servers

In a recent incident response (IR) case, we discovered highly customized malware targeting Exchange infrastructure within government environments. Analysis of detection logs and clues...

Veeam Phishing via Wav File

A interesting phishing attempt was reported by a contact. It started with a simple email that looked like a voice mail notification like many...

Choo Choo Choose to ignore the vulnerability • Graham Cluley

In episode 426 of the “Smashing Security” podcast, Graham reveals how you can hijack a train’s...

MG – Darknet Diaries

Full Transcript In this episode we talk with MG (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG...

Navigating the labyrinth of forks

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into...

Recent articles