Small world: The revitalization of small AI models for cybersecurity
Sophos X-Ops explores why larger isn’t always better when it comes to solving security challenges with AI
“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a right hand on Blue down the center. This wasn’t Blue’s first day and…
ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat actor. “ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nation-state actor, which affected a very…
From the National Privacy Commission of the Philippines: October 27, 2025 10:57 AM Last Edit: October 27th, 2025 The National Privacy Commission (NPC) urges the public to exercise heightened vigilance following reports of data leak allegedly involving G-Xchange, Inc., operator of GCash, which surfaced online on 26 October 2025. The NPC has immediately launched an……
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others. “Rhadamanthys was initially promoted through posts on cybercrime forums, but soon it…
A scary breach showed up in my news search today. Jamie Singleton reports: On Saturday, November 8, the Telegraph reported Wiltshire Police had accidentally released sensitive information. The article reads: “These included the door codes to safe houses for victims of rape and sexual assault, codes to access systems where digital files of evidence are……
Porokhnia Yana reports: Intelligence has obtained further evidence of Russian abduction of Ukrainian children from the temporarily occupied territories of Ukraine. This was reported by the Main Intelligence Directorate. Cyber experts obtained this information as part of a large-scale cyber operation against the servers of the so-called “government of Crimea”. These resources contained documentation confirming the…