Cybersecurity

Analysis of the ToolShell vulnerabilities and exploit code

On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of on-premise SharePoint servers. According to the reports, observed attacks did not require authentication,...
spot_img

DeceptiveDevelopment targets freelance developers

Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers....

We’re Backfilling and Cleaning Stealer Logs in Have I Been Pwned

I think I've finally caught my breath after dealing with those 23...

159-CVE January Patch Tuesday smashes single-month record – Sophos News

Microsoft on Tuesday released 159 patches touching 13 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity,...

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

Mar 01, 2025Ravie LakshmananPrivacy / Data Protection Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following...

VEEAM exploit seen used again with a new ransomware: “Frag” – Sophos News

Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities...

Kaspersky SOC analyzes an incident involving a web shell used as a backdoor

Web shells have evolved far beyond their original purpose of basic remote command execution, and many now function more like lightweight exploitation frameworks. These...
spot_img