Cybersecurity

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s...
Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach...

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as...

Industrial threat report for Q3 2025

Statistics across all threats In Q3 2025, the percentage of ICS computers on which malicious objects were blocked decreased from the previous quarter by 0.4...

Malicious Process Environment Block Manipulation

Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked...

Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security

Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast...

How to scam someone in seven days • Graham Cluley

Romance scammers have apparently discovered astrology… and Taurus is their secret weapon. In episode 449 of “Smashing...

LoD – Darknet Diaries

Full Transcript The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity...

Weekly Update 484

I think the start of this week's video really nailed it for the techies amongst us: shit doesn't work, you change something random and...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

The HoneyMyte APT now protects malware with a kernel-mode rootkit

Overview of the attacks In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old,...

Recent articles