Cybersecurity

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels look for chatbot websites on search engines, and threat actors have started abusing the popularity of LLMs. We previously reported attacks...
.] On April 29, 2025, my Raspberry Pi-based Cowrie SSH honeypot captured a sophisticated attack campaign targeting Linux systems. This wasn't just another automated scanner - the logs reveal a multi-stage attack involving SSH brute forcing, backdoor...

Patch Tuesday, June 2025 Edition

Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the...

Will AI collapse under its own garbage, and AI charity “Hunger Games” • Graham Cluley

In episode 54 of The AI Fix, Graham saves humanity with a CAPTCHA, Mark wonders whether...

Vastaamo – Darknet Diaries

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...

BladedFeline: Whispering in the dark

In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT...

Troy Hunt: Weekly Update 454

We're two weeks in from the launch of the new HIBP, and...

When cybercriminals eat their own – Sophos News

At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...

Why More Security Leaders Are Selecting AEV

Jun 06, 2025The Hacker NewsCyber Resilience / Penetration Testing Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies...

Desktop and IoT threat statistics for Q1 2025

IT threat evolution in Q1 2025. Non-mobile statisticsIT threat evolution in Q1 2025. Mobile statistics The statistics in this report are based on detection verdicts...

Phishing e-mail that hides malicious link from Outlook users

I recently came across an interesting phishing e-mail. At first glance, it looked like a “normal” phishing that tried to pass itself off as...

Russian hackers targeted UK Ministry of Defence

The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked hackers pose as journalists.The...

Axact – Darknet Diaries

Full Transcript Axact sells fake diplomas and degrees. What could go wrong with this business plan? Support for this episode comes from...

This month in security with Tony Anscombe – May 2025 edition

From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life...

Recent articles