Cybersecurity

HeartCrypt’s wholesale impersonation effort – Sophos News

Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes: Malware impersonating, subverting, and...

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

Sep 27, 2025Ravie LakshmananMalware / Network Security Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing...

What happens when a cybersecurity company gets phished? – Sophos News

If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a...

Shai-Hulud worm infects npm packages

Introduction The modern development world is almost entirely dependent on third-party modules. While this certainly speeds up development, it also creates a massive attack surface...

Exploit Attempts Against Older Hikvision Camera Vulnerability

I notice a new URL showing up in our web honeypot logs, which looked a bit interesting: /System/deviceInfo?auth=YWRtaW46MTEK The full request: GET /System/deviceInfo?auth=YWRtaW46MTEK Host: 3.87.70.24 User-Agent: python-requests/2.32.4 Accept-Encoding: gzip, deflate Accept:...

Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security

At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers...

US citizen charged in latest twist of notorious data breach

The Vastaamo hack was the worst data breach in Finnish history.Psychotherapy clinic Vastaamo found itself the victim of an extortionist who hacked its systems...

The D.R. Incident – Darknet Diaries

Full Transcript Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks...

Gamaredon X Turla collab

In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this...

Have I Been Pwned Demos Are Now Live!

Well, one of them is, but what's important is that we now...

GOLD SALEM’s Warlock operation joins busy ransomware landscape – Sophos News

Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group. The group, which CTU™ researchers track as...

TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks

The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT...

Recent articles