Cybersecurity

On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, and many more. And, of course,...
Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on the PulseChain network, fell victim to a sophisticated exploit involving liquidity manipulation and reward minting. The attack resulted in an initial...

Microsoft Office Russian Dolls – SANS Internet Storm Center

You probably know what are the Russian or Matryoshka dolls. It's a set of wooden dolls of decreasing size placed one inside another. I found an interesting...

Tinder’s camera roll and the Buffett deepfake • Graham Cluley

Tinder has got a plan to rummage through your camera roll, and Warren Buffett keeps popping...

Hieu – Darknet Diaries

Full Transcript All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found...

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose...

2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned

I hate hyperbolic news headlines about data breaches, but for the "2...

Windows Server Update Services (WSUS) vulnerability abused to harvest sensitive data – Sophos News

Counter Threat Unit™ (CTU) researchers are investigating exploitation of a remote code execution vulnerability (CVE-2025-59287) in Microsoft’s Windows Server Update Service (WSUS), a native...

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with capabilities to observe network...

A CISO playbook – Sophos News

The North Korean worker scheme has expanded into a global threat. Although it originally focused on U.S. technology companies, the scheme has spread to...

How we linked ForumTroll APT to Dante spyware by Memento Labs

In March 2025, Kaspersky detected a wave of infections that occurred when users clicked on personalized phishing links sent via email. No further action...

Updates to Domainname API – SANS Internet Storm Center

For several years, we have offered a "new domain" list of recently registered (or, more accurately, recently discovered) domains. This list is offered via...

Tanya – Darknet Diaries

Full Transcript Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode,...

5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between...

Recent articles