Adobe Reader zero-day vulnerability in active exploitation
Categories: Threat Research Tags: advisory, vulnerability, Adobe Reader
Noindex workflow category for imported/news content.
Categories: Threat Research Tags: advisory, vulnerability, Adobe Reader
We can’t control the pace of AI-driven vulnerability discovery, but we can control how fast we respond. Categories: Sophos Insights Tags: LLM, AI, Exploit, vulnerability, Active Adversary, Pacific Rim
It’s Trans Day of Visibility, and I’m at an event space in the heart of New York City’s Commie Corridor to learn how to become less visible online. The crowd gathered at the aptly-named Trans Pecos in Ridgewood, Queens is here for “404: Deadname Not Found,” a digital self-defense workshop which promises to teach trans…
Microsoft has terminated an account associated with VeraCrypt, a popular and long-running piece of encryption software, throwing future Windows updates of the tool into doubt, VeraCrypt’s developer told 404 Media. The move highlights the sometimes delicate supply chain involved in the publication of open source software, especially software that relies on big tech companies even…
TeleGuard, an app that markets itself as a secure, end-to-end encrypted messaging platform which has been downloaded more than a million times, implements its encryption so poorly that an attacker can trivially access a user’s private key and decrypt their messages, multiple security researchers told 404 Media. TeleGuard also uploads users’ private keys to a…
Categories: Threat Research Tags: advisory, NPM, Axios
A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway? Categories: Threat Research Tags: STAC6405, infostealer, RMM, Phishing
“We’ll have a generation of security professionals who can supervise AI but can’t function without it.” Categories: AI Research, Sophos Insights Tags: AI, AI Cybersecurity, AI RESEARCH, Generative AI, SOC
#1 ranked in 78 global reports Categories: Products & Services Tags: MDR, network, Endpoint, Firewall
WebinarTV, a company that bills itself as “a search engine for the best webinars,” is secretly scanning the internet for Zoom meeting links, recording the calls, and turning them into AI-generated podcasts for profit. In some cases, people only found out that their Zoom calls were recorded once WebinarTV reached out to them directly to…