Cybersecurity

Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE-2025-43200, was addressed on February...
Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels look for chatbot websites on search engines, and threat actors have started abusing the popularity of LLMs. We previously reported attacks...

Quasar RAT Delivered Through Bat Files

RAT's are popular malware. They are many of them in the wild, Quasar being one of them. The malware has been active for a...

Marks & Spencer’s ransomware nightmare

Over Easter, retail giant Marks & Spencer (M&S) discovered that it had suffered a highly damaging ransomware attack that left some shop shelves empty,...

Vastaamo – Darknet Diaries

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...

BladedFeline: Whispering in the dark

In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT...

Troy Hunt: Weekly Update 454

We're two weeks in from the launch of the new HIBP, and...

When cybercriminals eat their own – Sophos News

At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...

Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

Jun 05, 2025Ravie LakshmananNetwork Security / Vulnerability Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that,...

How to find container-based threats in host-based logs

The risks associated with containerized environments Although containers provide an isolated runtime environment for applications, this isolation is often overestimated. While containers encapsulate dependencies and...

Simple SSH Backdoor – SANS Internet Storm Center

For most system and network administrators, the free SSH client Putty has been their best friend for years! This tool was also (ab)used by...

Russian hackers targeted UK Ministry of Defence

The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked hackers pose as journalists.The...

The Mimics of Punjab – Darknet Diaries

Full Transcript This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a...

Don’t give your personal data to fraudsters: Dodging Docusign scam emails

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to...

Recent articles