Cybersecurity

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this month that saw malware infiltrate its internal systems, and access data related...
Full Transcript The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Ronnie works for...

How fraudsters abuse Google Forms to spread scams

The form and quiz-building tool is a popular vector for social engineering...

You’ll Soon Be Able to Sign in to Have I Been Pwned (but Not Login, Log in or Log On)

How do seemingly little things manage to consume so much time?! We...

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Apr 22, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers have detailed a malware campaign that's targeting Docker environments with a previously undocumented technique to mine...

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor

Day after day, threat actors create new malware to use in cyberattacks. Each of these new implants is developed in its own way, and...

RedTail, Remnux and Malware Management [Guest Diary]

Introduction When I first saw malware being uploaded to my honeypot, I was lacking the requisite experience to reverse engineer it, and to understand what...

Hacking the hackers… with a credit card? • Graham Cluley

A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that...

Axact – Darknet Diaries

Full Transcript Axact sells fake diplomas and degrees. What could go wrong with this business plan? Support for this episode comes from...

Attacks on the education sector are surging: How can cyber-defenders respond?

Academic institutions have a unique set of characteristics that makes them attractive...

Weekly Update 447

I'm home! Well, for a day, then it's off to the other side of the country (which I just flew over last night on...

Industrial-strength April Patch Tuesday covers 135 CVEs – Sophos News

Microsoft on Tuesday released 135 patches affecting 19 product families. Ten of the addressed issues, all remote code execution issues, are considered by Microsoft...

Recent articles