Cybersecurity

Velociraptor incident response tool abused for remote access – Sophos News

In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital forensics and incident response...

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that's targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity...

Modern vehicles: the cybersecurity trends

Modern vehicles are transforming into full-fledged digital devices that offer a multitude of features, from common smartphone-like conveniences to complex intelligent systems and services...

Don’t Forget The “-n” Command Line Switch

A lot of people like the command line, the CLI, the shell (name it as you want) because it provides a lot of powerful tools...

Europol says Telegram post about 50,000 Qilin ransomware award is fake

It's not unusual for law enforcement agencies to offer substantial rewards for information which might lead to the identification, arrest, and conviction of cybercriminals.For...

Welcome To Video – Darknet Diaries

Full Transcript Andy Greenberg brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to...

AI-powered financial scams swamp social media

Can you tell the difference between legitimate marketing and deepfake scam ads?...

Weekly Update 465

How much tech stuff do I have sitting there in progress, literally just within arm's reach? I kick off this week's video going through...

August Patch Tuesday includes blasts from the (recent) past – Sophos News

Microsoft on Tuesday announced 109 patches affecting 16 product families. Eighteen of the addressed issues are considered by Microsoft to be of Critical severity,...

NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More

Aug 18, 2025Ravie LakshmananCybersecurity / Hacking News Power doesn't just disappear in one big breach. It slips away in the small stuff—a patch that's missed,...

Phishing and scams: how fraudsters are deceiving users in 2025

Introduction Phishing and scams are dynamic types of online fraud that primarily target individuals, with cybercriminals constantly adapting their tactics to deceive people. Scammers invent...

SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations, (Thu, Aug 14th)

As the world gradually adopts and transitions to using 5G for mobile, operational technology (OT), automation and Internet-of-Things (IoT) devices, a secure 5G network...

Recent articles