Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the MSP’s
Author: qku24

The GodFather banking malware has resurfaced with a dangerous upgrade. Previously known for overlaying fake login screens on financial apps, the malware now uses on-device

The Good | Global Crackdowns on Cybercrime: Arrests, Malware Takedowns & Data Theft Charges The actor behind the PowerSchool attacks, a Massachusetts college student named
Rapid7’s Q1 2025 incident response data highlights several key initial access vector (IAV) trends, shares salient examples of incidents investigated by the Rapid7 Incident Response (IR) team,

The Verizon Data Breach Investigations Report (DBIR) is one of cybersecurity’s most authoritative annual reports. The 2025 DBIR highlights critical trends including rising GenAI-related risks,

Find and Fix Risky NHIs Before Adversaries Exploit Them Analysts can use the dashboard to find high-risk non-human identities and close security gaps before

Cybereason issues Threat Analysis reports to investigate emerging threats and provide practical recommendations for protecting against them. In this Threat Analysis report, Cybereason investigates the

“When suppliers hold sensitive operational or financial data, even in the absence of client personally identifiable information, they become a highly attractive target for threat

Executive Summary We recently discovered a large-scale campaign that has been compromising legitimate websites with injected, obfuscated JavaScript code. Threat actors commonly use this type

Jun 19, 2025Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have uncovered two local privilege escalation (LPE) flaws that could be exploited to gain root privileges on