Cybersecurity
Tech Trends & Innovations
Coinbase CEO Brian Armstrong trolls the prediction markets
On Thursday, at the end of Coinbase’s third quarter earnings call, CEO Brian Armstrong admitted that he was “a little bit distracted,” because he’d been “tracking the prediction market...
Gaming & Graphics
Is GTA 6 coming to Switch 2? What we know so far
Grand Theft Auto 6 will undoubtedly be one of the biggest launches in the history of video games,...
Cybersecurity
BRONZE BUTLER exploits Japanese asset management software vulnerability – Sophos News
In mid-2025, Counter Threat Unit™ (CTU) researchers observed a sophisticated BRONZE BUTLER campaign that exploited a zero-day vulnerability...
Software Updates & Reviews
Beyond Request-Response: Architecting Real-time Bidirectional Streaming Multi-agent System
As we move toward building more sophisticated AI agents, the limitations of the traditional...
Tech Trends & Innovations
Inside Celosphere 2025: Why there’s no ‘enterprise AI’ without process intelligence
Presented by CelonisAI adoption is accelerating, but results often lag expectations. And enterprise leaders are under pressure to...
Look out! CapCut copycats are on the prowl
Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to...
Weekly Update 447
I'm home! Well, for a day, then it's off to the other side of the country (which I just flew over last night on...
Moving CVEs past one-nation control – Sophos News
Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...
Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported...
Most frequently encountered malware and abused software – Sophos News
This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...
GOFFEE’s recent attacks: new tools and techniques
GOFFEE is a threat actor that first came to our attention in early 2022. Since then, we have observed malicious activities targeting exclusively entities...

