Cybersecurity

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Apr 11, 2025Ravie LakshmananNetwork Security / Vulnerability Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices...

GOFFEE’s recent attacks: new tools and techniques

GOFFEE is a threat actor that first came to our attention in early 2022. Since then, we have observed malicious activities targeting exclusively entities...

Network Infraxploit [Guest Diary], (Wed, Apr 9th)

Background I recently had the opportunity to get hands on with some Cisco networking devices. Due to being a network engineer prior to my current...

Signalgate sucks, and the quandary of quishing • Graham Cluley

QR codes are being weaponised by scammers — so maybe think twice before scanning that parking...

Grifter – Darknet Diaries

Full Transcript Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days...

No, you’re not fired – but beware of job termination scams

Some employment scams take an unexpected turn as cybercriminals shift from “hiring”...

Weekly Update 446

After an unusually long day of travelling from Iceland, we've finally made it to the land of Guinness, Leprechauns, and a tax haven for...

Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream – Sophos News

Late in January 2025, a Managed Service Provider (MSP) administrator received a well-crafted phishing email containing what appeared to be an authentication alert for...

North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages

Apr 05, 2025Ravie LakshmananMalware / Supply Chain Attack The North Korean threat actors behind the ongoing Contagious Interview campaign are spreading their tentacles on the...

The 2025 Sophos Active Adversary Report – Sophos News

The Sophos Active Adversary Report celebrates its fifth anniversary this year. The report grew out of a simple question: What happens after attackers breach...

TookPS distributed under the guise of UltraViewer, AutoCAD, and Ableton

In early March, we published a study detailing several malicious campaigns that exploited the popular DeepSeek LLM as a lure. Subsequent telemetry analysis indicated...

Surge in Scans for Juniper “t128” Default User

Last week, I noticed a surge in scans for the username "t128". This username, accompanied by the password "128tRoutes," is a well-known default account...

Recent articles