Sophos Firewall v21.5: DNS protection
How to make the most of the new features in Sophos Firewall v21.5.
The following is a machine translation from a report in Ukrainian by the country’s national police cyber department: A 35-year-old man hacked more than 5,000 customer accounts of a world-famous hosting company to generate cryptocurrency on the organization’s servers. The defendant faces up to 15 years in prison. Police officers determined that a 35-year-old native…
Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. “UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in…
German prosecutors have charged three Russian-German nationals for acting as secret service agents for Russia. The individuals, named Dieter S., Alexander J., and Alex D., have been accused of working for a foreign secret service. Dieter S. is also alleged to have participated in sabotage operations as well as taking pictures of military installations with…
The strange case of “DR32” just got a bit stranger. It looks like the Australian national will get a plane ticket back to Australia courtesy of Homeland Security. David Kee Crees, an Australian national who had also been known online as “Abdilo,” “Notavirus,” “Surivaton”, and “Grey Hat Mafia’s Bitch,” was extradited to the U.S. from…
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need “AI Governance,” but they have no idea what they are actually looking for. The CISO’s Dilemma:…
The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent scheme. “These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent