Cybersecurity

When cybercriminals eat their own – Sophos News

At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...

Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

Jun 05, 2025Ravie LakshmananNetwork Security / Vulnerability Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that,...

How to find container-based threats in host-based logs

The risks associated with containerized environments Although containers provide an isolated runtime environment for applications, this isolation is often overestimated. While containers encapsulate dependencies and...

Simple SSH Backdoor – SANS Internet Storm Center

For most system and network administrators, the free SSH client Putty has been their best friend for years! This tool was also (ab)used by...

Russian hackers targeted UK Ministry of Defence

The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked hackers pose as journalists.The...

The Mimics of Punjab – Darknet Diaries

Full Transcript This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a...

Don’t give your personal data to fraudsters: Dodging Docusign scam emails

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to...

Weekly Update 453

Well, the last few weeks of insane hours finally caught up with me 🤒 Not badly, but I evidently burned enough midnight oil to...

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News

Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into...

3AM ransomware actors dropped virtual machine with vishing and Quick Assist – Sophos News

Ransomware is usually a crime of opportunity.  Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge devices...

Dero miner spreads inside containerized Linux environments

Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an exposed Docker API, and bites exploits it by creating...

Recent articles