Cybersecurity

Most frequently encountered malware and abused software – Sophos News

This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and midsized businesses (SMBs). For a...

Thunderbolt 4 vs Thunderbolt 5: Key Differences

Trying to understand the differences with Thunderbolt 4 vs Thunderbolt 5? Well, Thunderbolt technology has revolutionized data transfer,...

This lesser-known Twilight Zone episode inspired Ryan Coogler’s Sinners

Ryan Coogler, the Academy Award-nominated director of Creed and Black Panther, hasn’t been shy at all about citing...
spot_img

Gaming or gambling? Lifting the lid on in-game loot boxes

The virtual treasure chests and other casino-like rewards inside your children’s games...

Weekly Update 445

Well, this certainly isn't what I expected to be talking about this week! But I think the fact it was someone most people didn't...

PJobRAT makes a comeback, takes another crack at chat apps – Sophos News

In 2021, researchers reported that PJobRAT – an Android RAT first observed in 2019 – was targeting Indian military personnel by imitating various dating...

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

î ‚Mar 30, 2025î „Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has...

Stealing user credentials with evilginx – Sophos News

Evilginx, a tool based on the legitimate (and widely used) open-source nginx web server, can be used to steal usernames, passwords, and session tokens,...

Operation ForumTroll exploits zero-days in Google Chrome

In mid-March 2025, Kaspersky technologies detected a wave of infections by previously unknown and highly sophisticated malware. In all cases, infection occurred immediately after...
spot_img