Sweet 16: Sophos named a Leader (again) in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
For the 16th consecutive report, Sophos has been recognized by Gartner as a Leader in the Endpoint Protection Platforms (EPP) category.
The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign codenamed DarkSpectre that has impacted 2.2 million users of Google Chrome, Microsoft Edge, and Mozilla Firefox. The activity is assessed to be the work of a Chinese threat actor that Koi Security is tracking under…
Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit. The vulnerability, tracked as CVE-2023-43010, relates to an unspecified vulnerability in WebKit that could result in memory corruption when processing maliciously crafted web…
Fiona Simmons reports: A tribal casino hotel in Minnesotahas become the latest victim of cybercrime targeting the gambling sector. Because of that, the property was forced to temporarily shut down many of its systems until the problem was resolved. The Junction Casino Hotel, a property in the Lower Sioux Indian Community, just suffered a cybersecurity breach. As…
Europol has announced the takedown of distributed denial of service (DDoS)-for-hire services that were used to launch thousands of cyber-attacks across the world. In connection with the operation, Polish authorities have arrested four individuals and the United States has seized nine domains that are associated with the now-defunct platforms. “The suspects are believed to be…
A federal district court in the Southern District of Florida has accepted the guilty pleas of two men to conspiring to obstruct, delay, or affect commerce through extortion in connection with ransomware attacks occurring in 2023. According to court documents, Ryan Goldberg, 40, of Georgia, Kevin Martin, 36, of Texas, and a third, unnamed co-conspirator……
Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but contain functionality to extract the actual command-and-control (C2) by using seemingly harmless Pastebin content as a dead…