Cybersecurity

Jason’s Pen Test – Darknet Diaries

Full Transcript Join us as we sit down with Jason Haddix, a renowned penetration tester who has made a name for himself by uncovering vulnerabilities in...
spot_img

Welcome To Video – Darknet Diaries

Full Transcript Andy Greenberg brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to...

Find your weak spots before attackers do

Here’s how open-source intelligence helps trace your digital footprint and uncover your...

Weekly Update 479

I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and...

WhatsApp compromise leads to Astaroth deployment – Sophos News

Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked...

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform...

Advancing Cybersecurity for Microsoft Environments – Sophos News

I’m pleased to share three significant updates that advance cybersecurity for organizations that rely on Microsoft technologies. These milestones expand the reach of Sophos’...
spot_img