Defend what matters: Introducing Sophos Endpoint for Legacy Platforms
Comprehensive endpoint security for critical systems
The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. “MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell scripts,” Recorded Future’s Insikt Group said in a report shared with The Hacker News. “The malware employs sandbox and virtual machine evasion techniques, a domain
Dharma Niles, Krish Dev and Yezen Saadah report: A hacker took over NYU’s website for at least two hours Saturday morning to expose over 3 million applicants’ names, test scores, majors and zip codes, as well as information related to family members and financial aid dating back to at least 1989. The university’s website was…
Aditya Raghuwanshi reports: NASCAR’s cybersecurity defenses were put to the test earlier this year, and now the sport has confirmed what had long been rumored: a ransomware group successfully breached its internal systems in March 2025. The attack, carried out by the Medusa group, reportedly resulted in over 1 terabyte of sensitive data being stolen—including…
Mitel has released security updates to address a critical security flaw in MiVoice MX-ONE that could allow an attacker to bypass authentication protections. “An authentication bypass vulnerability has been identified in the Provisioning Manager component of Mitel MiVoice MX-ONE, which, if successfully exploited, could allow an unauthenticated attacker to conduct an authentication bypass attack
The U.S. Securities and Exchange Commission (SEC) has filed charges against multiple companies for their alleged involvement in an elaborate cryptocurrency scam that swindled more than $14 million from retail investors. The complaint charged crypto asset trading platforms Morocoin Tech Corp., Berge Blockchain Technology Co., Ltd., and Cirkor Inc., as well as investment clubs AI…
Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks. “As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers,” Matthew Suozzo, Google Open…