Cybersecurity

Phishers Target Aviation Execs to Scam Customers – Krebs on Security

KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending...

French submarine secrets surface after cyber attack

European defence giant Naval Group has confirmed that it is investigating an alleged cyber attack which has seen what purports to be sensitive internal...

Hijacked Line – Darknet Diaries

Full Transcript Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how...

ToolShell attacks hit organizations worldwide

The ToolShell bugs are being exploited by cybercriminals and APT groups alike,...

11 Years of Microsoft Regional Director and 15 Years of MVP

I often wonder how much people in other professions genuinely love the...

The revitalization of small AI models for cybersecurity – Sophos News

The last few months and years have seen a wave of AI integration across multiple sectors, driven by new technology and global enthusiasm. There...

Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Jul 24, 2025The Hacker News Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online...

SOC files: an APT41 attack on government IT services in Africa

Introduction Some time ago, Kaspersky MDR analysts detected a targeted attack against government IT services in the African region. The attackers used hardcoded names of...

WinRAR MoTW Propagation Privacy – SANS Internet Storm Center

Since WinRAR 7.10, not all Mark-of-The-Web data (stored in the Zone.Identifier Alternate Data Stream) is propagated when you extract a file from an archive. Take...

Europol targets Kremlin-backed cybercrime gang NoName057(16)

A pro-Kremlin cybercrime network has been taken offline after an international law enforcement operation disrupted over 100 of its servers, detained two gang members,...

MG – Darknet Diaries

Full Transcript In this episode we talk with MG (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG...

Navigating the labyrinth of forks

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into...

Recent articles