Cybersecurity

Direct navigation — the act of visiting a website by manually typing a domain name in a web browser — has never been riskier: A new study finds the vast majority of “parked” domains — mostly...
Think your Kindle is harmless? Think again! In this episode, we unpack a Black Hat Europe talk revealing how a boobytrapped audiobook could exploit the Amazon eBook reader...

Lisa – Darknet Diaries

Full Transcript In this episode we hear some insider threat stories from Lisa Forte. Support for this show comes from Axonius. The...

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET...

Weekly Update 482

Perhaps it's just the time of year where we all start to wind down a bit, or maybe I'm just tired after another massive...

Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations – Sophos News

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

A Google Chrome extension with a "Featured" badge and six million users has been observed silently gathering every prompt entered by users into artificial...

Sophos achieves its best-ever results in the MITRE ATT&CK Enterprise 2025 Evaluation – Sophos News

MITRE ATT&CK® Evaluations are among the world’s most rigorous independent security tests. They emulate the tactics, techniques, and procedures (TTPs) used by real-world adversaries...

Where does the data stolen in a phishing attack go?

Introduction A typical phishing attack involves a user clicking a fraudulent link and entering their credentials on a scam website. However, the attack is far...

Abusing DLLs EntryPoint for the Fun

In the Microsoft Windows ecosystem, DLLs (Dynamic Load Libraries) are PE files like regular programs. One of the main differences is that they export...

Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of...

Maxie – Darknet Diaries

Full Transcript Maxie Reynolds loves an adventure, especially the kind where she’s breaking into buildings (legally). In this episode, she shares stories...

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at...

Weekly Update 481

Twelve years (and one day) since launching Have I Been Pwned, it's now a service that Charlotte and I live and breathe every day....

Recent articles