Not all Endpoint protection is created equal
When people ask us, “Aren’t all endpoint solutions the same these days?” — our answer is simple: No. They’re not.
More details have emerged on the arrest of an alleged XSS.is administrator by Ukrainian cyber police. The seizure notice has now appeared on the .onion version of the forum, and threads have been totally removed. As of the time of this update, and while the forum could still be updated before the seizure notice replaced…
A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos. “The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy…
Sophos has been recognized for defending customers of all sizes against today’s complex cyberattacks, achieving four prestigious awards at the SE Labs Awards 2025.
The following notice was posted June 3 on Facebook. As of publication, there is no notice on their website, and although AMI indicates that APT73 is responsible for the attack, there is nothing on Bashe’s leak site or any other leak site. 𝗨𝗥𝗚𝗘𝗡𝗧 𝗣𝗨𝗕𝗟𝗜𝗖 𝗡𝗢𝗧𝗜𝗖𝗘 – 𝗖𝗬𝗕𝗘𝗥𝗦𝗘𝗖𝗨𝗥𝗜𝗧𝗬 𝗔𝗟𝗘𝗥𝗧 𝗧𝗼 𝗼𝘂𝗿 𝘃𝗮𝗹𝘂𝗲𝗱 𝗰𝗹𝗶𝗲𝗻𝘁𝘀, 𝗽𝗮𝗿𝘁𝗻𝗲𝗿𝘀, 𝘀𝘁𝗮𝗸𝗲𝗵𝗼𝗹𝗱𝗲𝗿𝘀, 𝗮𝗻𝗱…
Last week, it appeared that Clinical Diagnostics (“Eurofins”) had paid a gang’s demands not to leak patient data that Nova had exfiltrated during a ransomware attack in July. Clinical Diagnostics in the Netheralands held patient data on 485,000 Dutch women in a cervical cancer screening program. Nova confirmed the payment to a Dutch news outlet…….
Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni. “The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,”