Cybersecurity

Weekly Update 477

What. A. Week. It wasn't just the preceding weeks of technical pain as we tried to work out how to get this data loaded,...

November Patch Tuesday does its chores – Sophos News

Microsoft on Tuesday announced 63 patches affecting 13 product families. Four of the addressed issues are considered by Microsoft to be of Critical severity,...

Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

Nov 12, 2025Ravie LakshmananCybercrime / Malware Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY)...

A CISO playbook – Sophos News

The North Korean worker scheme has expanded into a global threat. Although it originally focused on U.S. technology companies, the scheme has spread to...

How we linked ForumTroll APT to Dante spyware by Memento Labs

In March 2025, Kaspersky detected a wave of infections that occurred when users clicked on personalized phishing links sent via email. No further action...

Honeypot: Requests for (Code) Repositories

This is just a quick diary entry to report that I saw requests on my honeypot for (code) repositories: /.git/logs/refs/remotes/origin/main /.git/objects/info /.github /.github/dependabot.yml /.github/funding.yml /.github/ISSUE_TEMPLATE /.gitlab/issue_templates /.gitlab-ci /.git-secret /.svnignore /aws/bucket /s3/backup /s3/bucket /s3/credentials So watch out what you publish...

Hackers target massage parlour clients in blackmail scheme

South Korean police have uncovered a hacking operation that stole sensitive data from massage parlours and blackmailed their male clientele.According to local media reports,...

Tanya – Darknet Diaries

Full Transcript Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode,...

The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most...

Weekly Update 476

The 2 billion email address stealer log breach I talk about this week is almost ready to go at the time of writing. It's...

BRONZE BUTLER exploits Japanese asset management software vulnerability – Sophos News

In mid-2025, Counter Threat Unit™ (CTU) researchers observed a sophisticated BRONZE BUTLER campaign that exploited a zero-day vulnerability in Motex LANSCOPE Endpoint Manager to...

Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Nov 03, 2025Ravie LakshmananCryptocurrency / Threat Intelligence Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access...

Recent articles

Weekly Update 481