Cybersecurity

Ola – Darknet Diaries

Full Transcript In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us...

Weekly Update 482

Perhaps it's just the time of year where we all start to wind down a bit, or maybe I'm just tired after another massive...

Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations – Sophos News

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from...

Sophos achieves its best-ever results in the MITRE ATT&CK Enterprise 2025 Evaluation – Sophos News

MITRE ATT&CK® Evaluations are among the world’s most rigorous independent security tests. They emulate the tactics, techniques, and procedures (TTPs) used by real-world adversaries...

Where does the data stolen in a phishing attack go?

Introduction A typical phishing attack involves a user clicking a fraudulent link and entering their credentials on a scam website. However, the attack is far...

Abusing DLLs EntryPoint for the Fun

In the Microsoft Windows ecosystem, DLLs (Dynamic Load Libraries) are PE files like regular programs. One of the main differences is that they export...

Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of...

Grok the stalker, the Louvre heist, and Microsoft 365 mayhem • Graham Cluley

On this week’s show we learn that AI really can be a stalker’s best friend, as...

Maxie – Darknet Diaries

Full Transcript Maxie Reynolds loves an adventure, especially the kind where she’s breaking into buildings (legally). In this episode, she shares stories...

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at...

Recent articles