Cybersecurity

GOLD BLADE remote DLL sideloading attack deploys RedLoader – Sophos News

Sophos analysts are investigating a new infection chain for the GOLD BLADE cybercriminal group’s custom RedLoader malware, which initiates command and control (C2) communications. The threat actors leverage a...

How To Check The Speed Of A USB Drive

If you want to check the speed of a USB drive in Windows 10 and 11, you can...

Rethinking Event Confirmation Emails: Start the Experience Right

By the time someone registers for your event, you’ve likely done a hundred things right. The landing page...

Google loses appeal over app store overhaul in Epic Games case

Google lost its appeal of a judge’s court order requiring the tech giant to revamp its app store in...

Sparking Zero Gets New Lease On Life With Switch 2

Dragon Ball: Sparking Zero is effectively Budokai Tenkaichi 4, bringing the hit manga and anime to...
spot_img

Gaming or gambling? Lifting the lid on in-game loot boxes

The virtual treasure chests and other casino-like rewards inside your children’s games...

Weekly Update 445

Well, this certainly isn't what I expected to be talking about this week! But I think the fact it was someone most people didn't...

PJobRAT makes a comeback, takes another crack at chat apps – Sophos News

In 2021, researchers reported that PJobRAT – an Android RAT first observed in 2019 – was targeting Indian military personnel by imitating various dating...

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

î ‚Mar 30, 2025î „Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has...

Stealing user credentials with evilginx – Sophos News

Evilginx, a tool based on the legitimate (and widely used) open-source nginx web server, can be used to steal usernames, passwords, and session tokens,...

Operation ForumTroll exploits zero-days in Google Chrome

In mid-March 2025, Kaspersky technologies detected a wave of infections by previously unknown and highly sophisticated malware. In all cases, infection occurred immediately after...
spot_img