Cybersecurity

spot_img

WhatsApp compromise leads to Astaroth deployment – Sophos News

Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked...

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Nov 25, 2025Ravie LakshmananData Exposure / Cloud Security New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are...

Advancing Cybersecurity for Microsoft Environments – Sophos News

I’m pleased to share three significant updates that advance cybersecurity for organizations that rely on Microsoft technologies. These milestones expand the reach of Sophos’...

ToddyCat APT’s new tools and techniques

Introduction Email remains the main means of business correspondence at organizations. It can be set up either using on-premises infrastructure (for example, by deploying Microsoft...

Use of CSS stuffing as an obfuscation technique?

From time to time, it can be instructive to look at generic phishing messages that are delivered to one’s inbox or that are caught...

Wind farm worker sentenced after turning turbines into a secret crypto mine

A technical manager at a Dutch wind farm operator has been sentenced to 120 hours of community service after it was discovered he had...
spot_img