Cybersecurity

LoD – Darknet Diaries

Full Transcript The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the...

What it is and how to protect yourself

Reusing passwords may feel like a harmless shortcut – until a single...

Troy Hunt: Weekly Update 485

15 mins and 40 seconds. That's how long it took to troubleshoot...

Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control

Jan 07, 2026Ravie LakshmananVulnerability / Automation Cybersecurity researchers have disclosed details of yet another maximum-severity security flaw in n8n, a popular workflow automation platform, that...

The HoneyMyte APT now protects malware with a kernel-mode rootkit

Overview of the attacks In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old,...

Risks of OOB Access via IP KVM Devices

Recently, a new "breed" of IP-based KVM devices has been released. In the past, IP-based KVM devices required dedicated "server-grade" hardware using IPMI. They...

The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has...

Santa Claus doesn’t exist (according to AI) • Graham Cluley

Is Santa Claus real? This Christmas special of The AI Fix podcast sets out to answer...

Oak Cliff Swipers – Darknet Diaries

Full Transcript He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity...

Weekly Update 484

I think the start of this week's video really nailed it for the techies amongst us: shit doesn't work, you change something random and...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

Recent articles