Cybersecurity

We survived the cyclone! That was a seriously weird week with lots of build-up to an event that last occurred before I was born....
Back in August 2022, Sophos X-Ops published a white paper on multiple attackers – that is, adversaries targeting the same organizations multiple times. One of our key recommendations in that research was to prevent repeated attacks...

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Mar 07, 2025Ravie Lakshmanan Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime and...

Stealers and backdoors are spreading under the guise of a DeepSeek client

Introduction Among the most significant events in the AI world in early 2025 was the release of DeepSeek-R1 – a powerful reasoning large language model...

DShield Traffic Analysis using ELK

Using the Kibana interface, sometimes it can be difficult to find traffic of interest since there can be so much of it. The 3...

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian...

ChatGPT saved my life, and making evil AIs by accident • Graham Cluley

In episode 40 of the AI Fix, Graham meets a shape-shifting GOAT, a robot dog gets...

Rachel – Darknet Diaries

Full Transcript Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a...

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims'...

Weekly Update 441

Processing data breaches (especially big ones), can be extremely laborious. And, of course, everyone commenting on them is an expert, so there's a heap...

159-CVE January Patch Tuesday smashes single-month record – Sophos News

Microsoft on Tuesday released 159 patches touching 13 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity,...

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

Feb 27, 2025Ravie LakshmananMalware / Network Security The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology...

Vulnerability landscape analysis for Q4 2024

Q4 2024 saw fewer published exploits for Windows and Linux compared to the first three quarters. Although the number of registered vulnerabilities continued to...

Unfurl v2025.02 released – SANS Internet Storm Center

I've been a big fan of Ryan Benson's unfurl tool since he released it a little over 5 years ago. Unfurl is a tool...

Recent articles