Cybersecurity

Don’t give your personal data to fraudsters: Dodging Docusign scam emails

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to...

Weekly Update 453

Well, the last few weeks of insane hours finally caught up with me 🤒 Not badly, but I evidently burned enough midnight oil to...

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News

Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into...

3AM ransomware actors dropped virtual machine with vishing and Quick Assist – Sophos News

Ransomware is usually a crime of opportunity.  Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge devices...

Dero miner spreads inside containerized Linux environments

Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an exposed Docker API, and bites exploits it by creating...

Resilient Secure Backup Connectivity for SMB/Home Users

If you are reading this, you are probably someone who will not easily go without internet connectivity for an extended amount of time. You...

3AM Ransomware Attackers Pose as IT Support to Compromise Networks

Cybercriminals are getting smarter. Not by developing new types of malware or exploiting zero-day vulnerabilities, but by simply pretending to be helpful IT support...

D3f4ult – Darknet Diaries

Full Transcript This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the...

ESET APT Activity Report Q4 2024–Q1 2025: Key findings

ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest...

Have I Been Pwned 2.0 is Now Live!

This has been a very long time coming, but finally, after a...

What cybercriminals do with their money (Part 5) – Sophos News

Content warning: Because of the nature of some of the activities we discovered, this series of articles contains content that some readers may find...

Recent articles