Cybersecurity
Cybersecurity
A phishing with invisible characters in the subject line
While reviewing malicious messages that were delivered to our handler inbox over the past few days, I noticed that the “subject” of one phishing e-mail looked quite strange when...
Hardware Releases
US and Japan move to loosen China’s rare earths grip — nations partner to build alternative pathways to power, resource independence
The US and Japan have signed a rare earths and energy cooperation agreement aimed squarely at China’s chokehold...
Tech Trends & Innovations
Samsung’s Galaxy Buds 4 Pro Only Have One Shot at Challenging AirPods Pro 3
Samsung’s Galaxy Buds 4 Pro wireless earbuds haven’t been announced...
Gaming & Graphics
Ron Gilbert’s new Death by Scrolling RPG about “never-ending grind” and “the absurdity of social media” is out now
For too long have you remembered...
Troy Hunt: Weekly Update 439
We're now eyeball-deep into the HIBP rebrand and UX work, totally overhauling...
February Patch Tuesday delivers 57 packages – Sophos News
Microsoft on Tuesday released 57 patches touching 13 product families. Two of the addressed issues are considered by Microsoft to be of Critical severity,...
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability
Feb 20, 2025Ravie LakshmananVulnerability / IT Security
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler...
Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” – Sophos News
Sophos X-Ops’ Managed Detection and Response (MDR) is actively responding to incidents tied to two separate groups of threat actors, each of which have...
The EAGERBEE backdoor may be related to the CoughingDown actor
Introduction
In our recent investigation into the EAGERBEE backdoor, we found that it was being deployed at ISPs and governmental entities in the Middle East....
Examining Redtail Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics [Guest Diary]
Introduction
From August to November 2024, my honeypot has captured a wide array of malicious content. In this analysis, I will focus on a specific...

