Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence…
Globally, security researchers and whistleblowers face increasingly hostile laws and judiciaries that are ready to levy fines and prison sentences.
What is the Vulnerability?On March 24, researchers disclosed a set of five vulnerabilities, collectively known as “IngressNightmare,” affecting Ingress-nginx, one of the popular ingress controllers available for Kubernetes. Using Ingress-NGINX is one of the most common methods for exposing Kubernetes applications externally.CVE-2025-1974 is considered the most serious of the five and has been assigned a…
At Sophos, we’re proud to champion the next generation of women in tech by creating early opportunities, fostering confidence, and supporting inclusive initiatives that empower girls to explore and thrive in technology.
Chinese APT threat actors compromised an organization’s ArcGIS server, modifying the widely used geospatial mapping software for stealth access.