Sophos Firewall v21 MR1 is now available
It’s a fully supported upgrade from v21, v20, v19.5 and v19.0.
Orlando, Florida – United States Attorney Roger B. Handberg announces that Michael Scheuer (39, Orlando) today pleaded guilty to one count of knowingly transmitting a program, code, or command to a protected computer and intentionally causing damage without authorization and one count of aggravated identity theft. Scheuer faces a maximum penalty of 10 years in federal prison…
Jonathan Greig reports: A popular Russian bulletproof hosting service provider named Media Land was sanctioned by the U.S. Treasury and international partners on Wednesday for its alleged support of ransomware gangs and other cybercriminal operations. The St. Petersburg-based company provides hackers with access to IP addresses, servers and domains that are used to spread malware,……
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a command-and-control (C2) server, Kaspersky researcher Lisandro Ubiedo said in an analysis published today. There are currently no details on how the botnet malware is propagated;
The following is a personal statement. Today is a day of national protest against the authoritarian regime being imposed by a narcissist and those who are afraid to stand up to him. Today is the day when my husband — an arch-Conservative who has never participated in a political protest in his life — is……
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0994 (CVSS v4 score: 8.6), a deserialization of untrusted data bug that could permit an attacker to conduct remote code execution….
Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches. These five real vulnerabilities, uncovered by Intruder’s bug-hunting team, reveal how attackers turn overlooked flaws into serious security incidents. 1. Stealing AWS Credentials with a Redirect Server-Side Request…