Cybersecurity

Hijacked Line – Darknet Diaries

Full Transcript Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how...

Evasive Panda scouting cloud services

In this blogpost, we provide a technical analysis of CloudScout, a post-compromise toolset used by Evasive Panda to target a...

Weekly Update 438

I think what's really scratching an itch for me with the home theatre thing is that it's this whole geeky world of stuff that...

Scalable Vector Graphics files pose a novel phishing threat – Sophos News

Criminals who conduct phishing attacks over email have ramped up their abuse of a new threat vector designed to bypass existing anti-spam and anti-phishing...

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an...

Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News

For more than five years, Sophos has been investigating multiple China-based groups targeting Sophos firewalls, with botnets, novel exploits, and bespoke malware.With assistance from...

What “Nigerian” spam looks like in the mid-2020s

“Nigerian” spam is a collective term for messages designed to entice victims with alluring offers and draw them into an email exchange with scammers,...

Some updates to our data feeds

We have offered several different data feeds via our API or other means. However, we are often not very good at documenting what these...

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang – Krebs on Security

The FBI and authorities in The Netherlands this week seized dozens of servers and domains for a hugely popular spam and malware dissemination service...

Hackers get hacked, the British Museum IT shutdown, and social media kidnaps • Graham Cluley

What happens when eager computer enthusiasts unknowingly download a trojanized hacking tool and find themselves on...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Tony Fadell: Innovating to save our planets

We Live Science As methane emissions come under heightened global scrutiny, learn how...

Recent articles