Cybersecurity

Sep 02, 2025Ravie LakshmananMalware / Threat Intelligence The North Korea-linked threat actor known as the Lazarus Group has been attributed to a social engineering campaign that distributes three different pieces of cross-platform malware called PondRAT, ThemeForestRAT, and...
Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the MSP’s remote monitoring and management (RMM) tool, SimpleHelp, and then used it...

How attackers adapt to built-in macOS protection

If a system is popular with users, you can bet it’s just as popular with cybercriminals. Although Windows still dominates, second place belongs to...

Increasing Searches for ZIP Files

I noticed recently that we have more and more requests for ZIP files in our web honeypot logs. Over the last year, we have...

Affiliates Flock to ‘Soulless’ Scam Gambling Machine – Krebs on Security

Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventually...

Oops! I auto-filled my password into a cookie banner • Graham Cluley

We unpack how some password managers can be tricked into coughing up your secrets, with a...

Bike Index – Darknet Diaries

Full Transcript Have you ever got your bike stolen? In this episode we dive into the world of stolen bikes. Who...

‘What happens online stays online’ and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting...

Weekly Update 466

I'm fascinated by the unwillingness of organisations to name the "third party" to which they've attributed a breach. The initial reporting on the Allianz...

Threat Intelligence Executive Report – Volume 2025, Number 4 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™...

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the...

3AM ransomware actors dropped virtual machine with vishing and Quick Assist – Sophos News

Ransomware is usually a crime of opportunity.  Attackers typically strike through an easily discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge...

Gh0st RAT-based GodRAT attacks financial organizations

Summary In September 2024, we detected malicious activity targeting financial (trading and brokerage) firms through the distribution of malicious .scr (screen saver) files disguised as...

Increased Elasticsearch Recognizance Scans, (Tue, Aug 19th)

I noticed an increase in scans that appear to try to identify Elasticsearch instances. Elasticsearch is not a new target. Its ability to easily...

Recent articles