Cybersecurity

.Microsoft on Tuesday released 67 patches affecting 12 product families. Ten of the addressed issues, five involving 365 and Office and one involving SharePoint, are considered by Microsoft to be of Critical severity, and 17 have...
Jun 12, 2025Ravie LakshmananThreat Intelligence / Malware The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation...

New BrowserVenom malware being distributed via fake DeepSeek phishing website

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels look for chatbot websites on search engines, and threat...

Microsoft Patch Tuesday June 2025

Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has...

Marks & Spencer’s ransomware nightmare

Over Easter, retail giant Marks & Spencer (M&S) discovered that it had suffered a highly damaging ransomware attack that left some shop shelves empty,...

Vastaamo – Darknet Diaries

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...

BladedFeline: Whispering in the dark

In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT...

Troy Hunt: Weekly Update 454

We're two weeks in from the launch of the new HIBP, and...

When cybercriminals eat their own – Sophos News

At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...

Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice...

How to find container-based threats in host-based logs

The risks associated with containerized environments Although containers provide an isolated runtime environment for applications, this isolation is often overestimated. While containers encapsulate dependencies and...

Simple SSH Backdoor – SANS Internet Storm Center

For most system and network administrators, the free SSH client Putty has been their best friend for years! This tool was also (ab)used by...

Russian hackers targeted UK Ministry of Defence

The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked hackers pose as journalists.The...

Jim Hates Scams – Darknet Diaries

Full Transcript Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his...

Recent articles