Cybersecurity

Cybercrime on Main Street 2025 – Sophos News

Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in...

Outlaw botnet detected in an incident contained by Kaspersky

Introduction In a recent incident response case in Brazil, we dealt with a relatively simple, yet very effective threat focused on Linux environments. Outlaw (also...

SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics

For digital forensics and incident response professionals, extracting precise evidence from Windows systems is critical to understanding and mitigating threats. I’m excited to introduce...

Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

How fraudsters abuse Google Forms to spread scams

The form and quiz-building tool is a popular vector for social engineering...

You’ll Soon Be Able to Sign in to Have I Been Pwned (but Not Login, Log in or Log On)

How do seemingly little things manage to consume so much time?! We...

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the...

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor

Day after day, threat actors create new malware to use in cyberattacks. Each of these new implants is developed in its own way, and...

RedTail, Remnux and Malware Management [Guest Diary]

Introduction When I first saw malware being uploaded to my honeypot, I was lacking the requisite experience to reverse engineer it, and to understand what...

Recent articles