Cybersecurity

Learn a Smarter Way to Defend Modern Applications

May 17, 2025The Hacker NewsDevSecOps / Threat Detection Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in...

Kaspersky industrial threat report for Q1 2025

Trends Relative stability from quarter to quarter. The percentage of ICS computers on which malicious objects were blocked remained unchanged from Q4 2024 at 21.9%....

Web Scanning SonicWall for CVE-2021-20016 – Update

I published on the 29 Apr 2025 a diary on scanning activity looking for SonicWall and since this publication this activity has grown...

Smashing Security podcast #417: Hello, Pervert!

Don’t get duped, doxxed, or drained! In this episode of “Smashing Security” we dive into the...

MalwareTech – Darknet Diaries

Full Transcript MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history....

Can we counter online disinformation?

Ever wondered why a lie can spread faster than the truth? Tune...

Weekly Update 451

The Have I Been Pwned Alpine Grand Tour is upon us! I've often joked that work is always either sitting at my desk at...

NICKEL TAPESTRY expands fraudulent worker operations – Sophos News

With this post, the X-Ops blog is thrilled to present research from our Sophos siblings newly joining us from Secureworks, of which CTU (the...

Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

May 10, 2025Ravie LakshmananBiometric Data / Privacy Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that...

Lumma Stealer, coming and going – Sophos News

In September 2024, a threat hunt across Sophos Managed Detection and Response’s telemetry uncovered a Lumma Stealer campaign using fake CAPTCHA sites that instructed...

Kaspersky ransomware report for 2024

Global ransomware trends and numbers With the International Anti-Ransomware Day just around the corner on May 12, Kaspersky explores the ever-changing ransomware threat landscape and...

Example of “Modular” Malware – SANS Internet Storm Center

Developers (of malware as well as goodware) don't have to reinvent the wheel all the time. Why rewrite a piece of code that was...

Recent articles