Cybersecurity

Ola – Darknet Diaries

Full Transcript In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us...

Weekly Update 482

Perhaps it's just the time of year where we all start to wind down a bit, or maybe I'm just tired after another massive...

Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations – Sophos News

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

A Google Chrome extension with a "Featured" badge and six million users has been observed silently gathering every prompt entered by users into artificial...

Sophos achieves its best-ever results in the MITRE ATT&CK Enterprise 2025 Evaluation – Sophos News

MITRE ATT&CK® Evaluations are among the world’s most rigorous independent security tests. They emulate the tactics, techniques, and procedures (TTPs) used by real-world adversaries...

Where does the data stolen in a phishing attack go?

Introduction A typical phishing attack involves a user clicking a fraudulent link and entering their credentials on a scam website. However, the attack is far...

Abusing DLLs EntryPoint for the Fun

In the Microsoft Windows ecosystem, DLLs (Dynamic Load Libraries) are PE files like regular programs. One of the main differences is that they export...

Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of...

Grok the stalker, the Louvre heist, and Microsoft 365 mayhem • Graham Cluley

On this week’s show we learn that AI really can be a stalker’s best friend, as...

Maxie – Darknet Diaries

Full Transcript Maxie Reynolds loves an adventure, especially the kind where she’s breaking into buildings (legally). In this episode, she shares stories...

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at...

Recent articles