Microsoft Office vulnerability (CVE-2026-21509) in active exploitation
Categories: Threat Research Tags: Microsoft Office, vulnerability, advisory
Noindex workflow category for imported/news content.
Categories: Threat Research Tags: Microsoft Office, vulnerability, advisory
From a quintuple-encryption ransomware attack to zany dark web schemes and AI fails, Sophos X-Ops looks back at some of our favorite weirdest incidents from the last few years – and the serious lessons behind them Categories: Threat Research Tags: Ransomware, Hive, Lockbit, BlackCat, LLM, AI, Money Laundering
Categories: Products & Services Tags: Ransomware, Enterprise, Solutions, The State of Ransomware
Categories: Sophos Insights Tags: Firewall, Ransomware
The availability of exploit code will likely lead to more widespread opportunistic attacks Tags: Threat Research, Featured, vulnerability, react2shell
Elon Musk, owner of the former social media network turned deepfake porn site X, is pushing people to pay for its nonconsensual intimate image generator Grok, meaning some of the app’s tens of millions of users are being hit with a paywall when they try to create nude images of random women doing sexually explicit…
Doublespeed, a startup backed by Andreessen Horowitz (a16z) that uses a phone farm to manage at least hundreds of AI-generated social media accounts and promote products has been hacked. The hack reveals what products the AI-generated accounts are promoting, often without the required disclosure that these are advertisements, and allowed the hacker to take control…
The availability of exploit code will likely lead to more widespread opportunistic attacks
#1 Ranked in 66 Global Reports
Analysis of the tradecraft evolution across 6 months and 11 incidents