Cybersecurity

The €600,000 gold heist, powered by ransomware • Graham Cluley

Ransomware doesn’t just freeze computers – it can silence alarms too. And when the Natural History...

Kill List – Darknet Diaries

Full Transcript The dark web is full of mystery. Some of it’s just made up though. Chris Monteiro wanted to see...

Gamaredon X Turla collab

In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this...

Querying the API, and the Free Test Key!

One of the most common use cases for HIBP's API is querying...

GOLD SALEM’s Warlock operation joins busy ransomware landscape – Sophos News

Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group. The group, which CTU™ researchers track as...

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented hacking group called ComicForm...

NICKEL TAPESTRY expands fraudulent worker operations – Sophos News

With this post, the X-Ops blog is thrilled to present research from our Sophos siblings newly joining us from Secureworks, of which CTU (the...

Kaspersky industrial threat report for Q2 2025

Statistics across all threats In Q2 2025, the percentage of ICS computers on which malicious objects were blocked decreased by 1.4 pp from the previous...

Internet Storm Center Diary 2025-09-18

The goal of this project is to test the suitability of various data entry points within the dshield ecosystem to determine which metrics are...

Recent articles