Cybersecurity

Moving CVEs past one-nation control – Sophos News

Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...

Sophisticated backdoor mimicking secure networking software updates

As we were looking into a cyberincident in April 2025, we uncovered a rather sophisticated backdoor. It targeted various large organizations in Russia, spanning...

It’s 2025… so why are obviously malicious advertising URLs still going strong?

While the old adage stating that “the human factor is the weakest link in the cyber security chain” will undoubtedly stay relevant in the...

Hacking the hackers… with a credit card? • Graham Cluley

A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that...

ANOM – Darknet Diaries

Full Transcript In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...

Look out! CapCut copycats are on the prowl

Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to...

Weekly Update 447

I'm home! Well, for a day, then it's off to the other side of the country (which I just flew over last night on...

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

Apr 15, 2025Ravie LakshmananLinux / Malware The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant of...

Recent articles