Cybersecurity

Example of “Modular” Malware – SANS Internet Storm Center

Developers (of malware as well as goodware) don't have to reinvent the wheel all the time. Why rewrite a piece of code that was...

The typo from hell • Graham Cluley

In episode 49 of The AI Fix, OpenAI kills off a sycophantic bot, our hosts are...

Shannen – Darknet Diaries

Full Transcript Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The...

It’s a wrap! RSAC 2025 highlights – Week in security with Tony Anscombe

From the power of collaborative defense to identity security and AI, catch...

Weekly Update 450

Looking back at this week's video, it's the AI discussion that I think about most. More specifically, the view amongst some that any usage...

Finding Minhook in a sideloading attack – and Sweden too – Sophos News

Late in 2023 and during the first half of 2024, we monitored an attack campaign targeting several of our customers in multiple locations. Though...

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers

May 01, 2025Ravie LakshmananMalware / Web Skimming Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a...

Cybercrime on Main Street 2025 – Sophos News

Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in...

Outlaw botnet detected in an incident contained by Kaspersky

Introduction In a recent incident response case in Brazil, we dealt with a relatively simple, yet very effective threat focused on Linux environments. Outlaw (also...

SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics

For digital forensics and incident response professionals, extracting precise evidence from Windows systems is critical to understanding and mitigating threats. I’m excited to introduce...

Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Recent articles