Cybersecurity
Cybersecurity
US charges suspected ransomware kingpin, and offers $10 million bounty for his capture
A US federal court has unssealed charges against a Ukrainian national who authorities allege was a key figure behind several strains of ransomware, including LockerGoga, MegaCortex, and Nefilim. Volodymyr Viktorovich...
Hardware Releases
What is an NPU and Why You Need One
What is an NPU? If you’ve been following the latest PC hardware launches, you’ve probably heard a new...
Tech Trends & Innovations
Charlie Kirk Is Dead After Utah Valley University Shooting
Charlie Kirk, the right-wing internet personality and cofounder of Turning Point USA, was shot on Wednesday afternoon at...
Welcoming Truyu to Have I Been Pwned’s Partner Program
I always used to joke that when people used Have I Been...
Threat Intelligence Executive Report – Volume 2025, Number 3 – Sophos News
Executive summary
The Counter Threat Unitâ„¢ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April,...
NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
î ‚Jul 04, 2025î „Ravie LakshmananZero-Day / Cyber Espionage
Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle (aka APT-Q-95) that has been...
Kaspersky 2025 SMB threat report
Cyberattackers often view small and medium-sized businesses (SMBs) as easier targets, assuming their security measures are less robust than those of larger enterprises. In...
Quick Password Brute Forcing Evolution Statistics
We have collected SSH and telnet honeypot data in various forms for about 10 years. Yesterday's diaries, and looking at some new usernames attempted...
Senator Chides FBI for Weak Advice on Mobile Security – Krebs on Security
Agents with the Federal Bureau of Investigation (FBI) briefed Capitol Hill staff recently on hardening the security of their mobile devices, after a contacts...