Cybersecurity

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the evil twin technique to...

What is UserAssist and how to use it in IR activities?

Introduction As members of the Global Emergency Response Team (GERT), we work with forensic artifacts on a daily basis to conduct investigations, and one of...

Experimental Suspicious Domain Feed – SANS Internet Storm Center

We have had a "newly registered domain" feed for a few years. This feed pulls data from ICANN's centralized zone data service (https://czds.icann.org) and...

Russian basketball player arrested in ransomware case despite being “useless with computers”

A Russian professional basketball player has been arrested for allegedly acting as a negotiator for a ransomware gang.26-year old Daniil Kasatkin, was reportedly arrested...

Grifter – Darknet Diaries

Full Transcript Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days...

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from...

Welcoming Push Security to Have I Been Pwned’s Partner Program

As we gradually roll out HIBP’s Partner Program, we’re aiming to deliver...

Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News

Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

Jul 08, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Russian organizations have been targeted as part of an ongoing campaign that delivers a previously undocumented Windows...

Recent articles