Cybersecurity

An analysis of a shadow Telegram channel’s lifespan

Telegram has won over users worldwide, and cybercriminals are no exception. While the average user chooses a messaging app based on convenience, user experience...

AutoIT3 Compiled Scripts Dropping Shellcodes

AutoIT3 is a powerful language that helps to built nice applications for Windows environments, mainly to automate tasks. If it looks pretty old, the...

A hacker doxxes himself, and social engineering-as-a-service • Graham Cluley

A teenage cybercriminal posts a smug screenshot to mock a sextortion scammer… and accidentally hands over...

Maxie – Darknet Diaries

Full Transcript Maxie Reynolds loves an adventure, especially the kind where she’s breaking into buildings (legally). In this episode, she shares stories...

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at...

Why Does Have I Been Pwned Contain “Fake” Email Addresses?

Normally, when someone sends feedback like this, I ignore it, but it...

Windows Server Update Services (WSUS) vulnerability abused to harvest sensitive data – Sophos News

Counter Threat Unit™ (CTU) researchers are investigating exploitation of a remote code execution vulnerability (CVE-2025-59287) in Microsoft’s Windows Server Update Service (WSUS), a native...

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks...

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News

Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...

New Tomiris tools and techniques: multiple reverse shells, Havoc, AdaptixC2

While tracking the activities of the Tomiris threat actor, we identified new malicious operations that began in early 2025. These attacks targeted foreign ministries,...

Conflicts between URL mapping and URL based access control.

We continue to encounter high-profile vulnerabilities related to the use of URL mapping (or "aliases") with URL-based access control. Last week, we wrote about...

State-backed spyware attacks are targeting Signal and WhatsApp users, CISA warns

CISA, the US Cybersecurity and Infrastructure Security Agency, has issued a new warning that cybercriminals and state-backed hacking groups are using spyware to compromise...

Recent articles