Cybersecurity

Court Injunctions are the Thoughts and Prayers of Data Breach Response

You see it all the time after a tragedy occurs somewhere, and...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious...

New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations

Oct 06, 2025Ravie LakshmananNetwork Security / Cyber Espionage A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to...

AmCache artifact: forensic value and a tool for data extraction

Introduction When it comes to digital forensics, AmCache plays a vital role in identifying malicious activities in Windows systems. This artifact allows the identification of...

More .well-known Scans – SANS Internet Storm Center

I have been writing about the ".well-known" directory a few times before. Recently, about attackers hiding webshells , and before that, about the purpose...

Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms – Krebs on Security

U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a...

Salesforce’s trusted domain of doom • Graham Cluley

Researchers uncovered a security flaw in Salesforce’s shiny new Agentforce. The vulnerability, dubbed “ForcedLeak”, let them...

Deviant – Darknet Diaries

Full Transcript Deviant Ollam is a physical penetration specialist. That means he’s paid to break into buildings to see if the...

How SMBs can fight back against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are...

Welcoming CERN to Have I Been Pwned

It's hard to explain the significance of CERN. It's the birthplace of...

HeartCrypt’s wholesale impersonation effort – Sophos News

Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes: Malware impersonating, subverting, and...

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

Sep 27, 2025Ravie LakshmananMalware / Network Security Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing...

Recent articles