Cybersecurity
Cybersecurity
Threat Intelligence Executive Report – Volume 2025, Number 4 – Sophos News
The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™ researchers identified the following noteworthy...
Industry Events & Conferences
AI in Hybrid Event Experiences: Smarter Engagement & Operations
Everyone’s selling it.
“AI in hybrid event experiences” is the new must-have, the new differentiator, the silver bullet. But...
Software Updates & Reviews
From Black Box to Blueprint
A remarkably common case in large established enterprises is that there
are systems that nobody...
Tech Trends & Innovations
Microsoft’s cloud service restored after reports of cut cables in the Red Sea
Microsoft said its Azure cloud platform has returned to normal service after an incident of cut underwater cables...
Hacker suspected of trying to cheat his way into university is arrested in Spain
Spanish police have arrested a suspected hacker for accessing a government website in order to alter the high school and university entrance exam grades...
Kill List – Darknet Diaries
Full Transcript
The dark web is full of mystery. Some of it’s just made up though. Chris Monteiro wanted to see...
This month in security with Tony Anscombe – August 2025 edition
From Meta shutting down millions of WhatsApp accounts linked to scam centers...
Home Assistant + Ubiquiti + AI = Home Automation Magic
It seems like every manufacturer of anything electrical that goes in the...
Velociraptor incident response tool abused for remote access – Sophos News
In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital forensics and incident response...
Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments.
"Unlike...