Cybersecurity

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. ...
Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach...

What Should We Learn From How Attackers Leveraged AI in 2025?

Jan 13, 2026The Hacker NewsThreat Intelligence / Identity Security Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry...

Industrial threat report for Q3 2025

Statistics across all threats In Q3 2025, the percentage of ICS computers on which malicious objects were blocked decreased from the previous quarter by 0.4...

YARA-X 1.11.0 Release: Hash Function Warnings

YARA-X's 1.11.0 release brings a new feature: hash function warnings. When you write a YARA rule to match a cryptographic hash (either the full file...

Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security

Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast...

pcTattletale founder pleads guilty in rare stalkerware prosecution

The founder of a spyware company that encouraged customers to secretly monitor their romantic partners has pleaded guilty to federal charges - marking one...

LoD – Darknet Diaries

Full Transcript The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity...

Troy Hunt: Weekly Update 483

Building out an IoT environment is a little like the old Maslow's...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

The HoneyMyte APT now protects malware with a kernel-mode rootkit

Overview of the attacks In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old,...

Recent articles