Cybersecurity

Nov 03, 2025Ravie LakshmananCryptocurrency / Threat Intelligence Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex's John Tuckner, the extension in question,...
On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, and many more. And, of course,...

BlueNoroff’s latest campaigns: GhostCall and GhostHire

Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38, Alluring Pisces, Stardust Chollima, and TA444) has adopted new infiltration strategies...

Identifying “research” and bug bounty related scans?

This week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose: Research and X-Hackerone-Research: plusultra X-Bugcrowd-Ninja: plusultra X-Bug-Hunter: true The purpose of these headers appears...

Aisuru Botnet Shifts from DDoS to Residential Proxies – Krebs on Security

Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative...

Inside the mob’s million-dollar poker hack, and a Formula 1 fumble • Graham Cluley

Basketball stars have allegedly joined forces with the mafia to fleece high-rollers in a poker scam...

Sam the Vendor – Darknet Diaries

Full Transcript Sam Bent, a.k.a. DoingFedTime, brings us a story of what it was like being a darknet market vendor. Support for...

Preventing business disruption and building cyber-resilience with MDR

Given the serious financial and reputational risks of incidents that grind business...

Weekly Update 475

It was the Synthient threat data that ate most of my time this week, and it continues to do so now, the weekend after...

Threat Intelligence Executive Report – Volume 2025, Number 5 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™...

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains...

The BetterBank DeFi protocol exploited for reward minting

Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on the PulseChain network, fell victim to a sophisticated exploit...

webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant?

Starting yesterday, some of our honeypots received POST requests to "/cgi-bin/webctrl.cgi", attempting to exploit an OS command injection vulnerability: POST /cgi-bin/webctrl.cgi Host: :80 User-Agent: Mozilla/5.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: es-MX,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding:...

Email Bombs Exploit Lax Authentication in Zendesk – Krebs on Security

Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing messages that come...

Recent articles