Cybersecurity
Cybersecurity
Most frequently encountered malware and abused software – Sophos News
This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and midsized businesses (SMBs). For a...
Hardware Releases
Thunderbolt 4 vs Thunderbolt 5: Key Differences
Trying to understand the differences with Thunderbolt 4 vs Thunderbolt 5? Well, Thunderbolt technology has revolutionized data transfer,...
Gaming & Graphics
This lesser-known Twilight Zone episode inspired Ryan Coogler’s Sinners
Ryan Coogler, the Academy Award-nominated director of Creed and Black Panther, hasn’t been shy at all about citing...
Gaming or gambling? Lifting the lid on in-game loot boxes
The virtual treasure chests and other casino-like rewards inside your children’s games...
Weekly Update 445
Well, this certainly isn't what I expected to be talking about this week! But I think the fact it was someone most people didn't...
PJobRAT makes a comeback, takes another crack at chat apps – Sophos News
In 2021, researchers reported that PJobRAT – an Android RAT first observed in 2019 – was targeting Indian military personnel by imitating various dating...
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
î ‚Mar 30, 2025î „Ravie LakshmananVulnerability / Zero-Day
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has...
Stealing user credentials with evilginx – Sophos News
Evilginx, a tool based on the legitimate (and widely used) open-source nginx web server, can be used to steal usernames, passwords, and session tokens,...
Operation ForumTroll exploits zero-days in Google Chrome
In mid-March 2025, Kaspersky technologies detected a wave of infections by previously unknown and highly sophisticated malware. In all cases, infection occurred immediately after...