Cybersecurity

Navigating the labyrinth of forks

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into...

Welcoming Aura to Have I Been Pwned’s Partner Program

One of the greatest fears we all have in the wake of...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

At this year’s Black Hat USA conference, Sophos Senior Data Scientists Ben Gelman and Sean Bergeron will give a talk on their research into...

Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Jul 15, 2025Ravie LakshmananBotnet / Network Security Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of 2025,...

What is UserAssist and how to use it in IR activities?

Introduction As members of the Global Emergency Response Team (GERT), we work with forensic artifacts on a daily basis to conduct investigations, and one of...

SSH Tunneling in Action: direct-tcp requests [Guest Diary]

As part of the SANS degree program curriculum, I had the opportunity to set up a honeypot to monitor log activities mimicking a vulnerable...

UK Arrests Four in ‘Scattered Spider’ Ransom Group – Krebs on Security

Authorities in the United Kingdom this week arrested four people aged 17 to 20 in connection with recent data theft and extortion attacks against...

Russian basketball player arrested in ransomware case despite being “useless with computers”

A Russian professional basketball player has been arrested for allegedly acting as a negotiator for a ransomware gang.26-year old Daniil Kasatkin, was reportedly arrested...

Revenge Bytes – Darknet Diaries

Full Transcript Madison’s nude photos were posted online. Her twin sister Christine came to help. This begins a bizarre and uneasy...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Weekly Update 459

New week, different end of the world! After a fleeting stop at home, we're in Japan for a proper holiday (yet somehow I'm still...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

Recent articles