Cybersecurity

Hackers exploit little-known WordPress MU-plugins feature to hide malware

A new security issue is putting WordPress-powered websites at risk. Hackers are abusing the “Must-Use” plugins (MU-plugins) feature to hide malicious code and maintain...

Kingpin – Darknet Diaries

Full Transcript In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A renowned hardware...

DeceptiveDevelopment targets freelance developers

Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers....

A Sneaky Phish Just Grabbed my Mailchimp Mailing List

You know when you're really jet lagged and really tired and the...

Stealing user credentials with evilginx – Sophos News

Evilginx, a tool based on the legitimate (and widely used) open-source nginx web server, can be used to steal usernames, passwords, and session tokens,...

APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware

Mar 27, 2025Ravie LakshmananMobile Security / Malware An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

Kaspersky financial threat report 2024

As more and more financial transactions are conducted in digital form each year, financial threats comprise a large piece of the global cyberthreat landscape....

Let's Talk About HTTP Headers. – SANS Internet Storm Center

Walking my dog earlier, I came across the sign on the right. Having just looked at yet another middleware/HTTP header issue (the Next.js problem...

BlackLock Ransomware: What You Need To Know

What is the BlackLock ransomware?BlackLock is a relatively new ransomware group. First seen in March 2024, the ransomware operation initially operated under the name...

Kill List – Darknet Diaries

Full Transcript The dark web is full of mystery. Some of it’s just made up though. Chris Monteiro wanted to see...

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims'...

Recent articles