Cybersecurity
Cybersecurity
Europol says Telegram post about 50,000 Qilin ransomware award is fake
It's not unusual for law enforcement agencies to offer substantial rewards for information which might lead to the identification, arrest, and conviction of cybercriminals.For instance, we have seen a...
Hardware Releases
Amazon axes price of this RTX 5080 & Ryzen 9800X3D gaming PC to lowest ever
10% off a high-end gaming PC that can play any game, in max settings, at any resolution...
Industry Events & Conferences
RFID vs. Bluetooth Smart Badges: What’s Best for Your Event?
Smart event badges are name tags with a brain. Instead of just showing who you are, they...
Tech Trends & Innovations
Details About the First iPhone Foldable Are Coming Into Focus
We keep collecting more details about what Apple's first foldable iPhone will look like when it launches in...
Weekly Update 447
I'm home! Well, for a day, then it's off to the other side of the country (which I just flew over last night on...
Moving CVEs past one-nation control – Sophos News
Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case with the news on...
Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
Cybersecurity researchers are warning of a "widespread and ongoing" SMS phishing campaign that's been targeting toll road users in the United States for financial...
Most frequently encountered malware and abused software – Sophos News
This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...
Detection engineering: why it is important and how to implement it in your SOC
Security operations centers (SOCs) exist to protect organizations from cyberthreats by detecting and responding to attacks in real time. They play a crucial role...
Online Services Again Abused to Exfiltrate Data
If Attackers can abuse free online services, they will do for sure! Why spend time to deploy a C2 infrastructure if you have plenty...