Cybersecurity

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs. ...
spot_img

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with...

Troy Hunt: Weekly Update 473

This week's video was recorded on Friday morning Aussie time, and as...

Threat Intelligence Executive Report – Volume 2025, Number 5 – Sophos News

The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™...

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware...

Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution

A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It targets mainly Brazilians and uses Portuguese-named URLs. To...

Clipboard Pictures Exfiltration in Python Infostealer

For a while, clipboard content has been monitored by many infostealers. Purposes can be multiple, like simply searching and exfiltrating juicy data or on-the-fly...
spot_img