Cybersecurity

A Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI...

Court Injunctions are the Thoughts and Prayers of Data Breach Response

You see it all the time after a tragedy occurs somewhere, and...

Anomaly detection betrayed us, so we gave it a new job – Sophos News

Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious...

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language...

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

Developing a machine-learning model to detect DLL hijacking

DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used...

More .well-known Scans – SANS Internet Storm Center

I have been writing about the ".well-known" directory a few times before. Recently, about attackers hiding webshells , and before that, about the purpose...

Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms – Krebs on Security

U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a...

Salesforce’s trusted domain of doom • Graham Cluley

Researchers uncovered a security flaw in Salesforce’s shiny new Agentforce. The vulnerability, dubbed “ForcedLeak”, let them...

Kill List – Darknet Diaries

Full Transcript The dark web is full of mystery. Some of it’s just made up though. Chris Monteiro wanted to see...

How SMBs can fight back against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are...

Welcoming CERN to Have I Been Pwned

It's hard to explain the significance of CERN. It's the birthplace of...

Recent articles