[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
[
privacy
|
malware
|
research
|
vendor
]
Wiz - Incidents
NCC Group Research
Euro 7 Anti-tampering and the Expanding Cybersecurity Landscape
Story of a Hundred Vulnerable Jenkins Plugins
Pumping Iron on the Musl Heap – Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap
In-Depth Technical Analysis of the Bybit Hack
EAP-TLS: The most secure option?
Research Paper – Machine Learning for Static Malware Analysis, with University College London
Black Hole of Trust: SEO Poisoning in Silver Fox’s Space Odyssey
Writing Robust Yara Detection Rules for Heartbleed
Working with the Open Technology Fund
An offensive guide to the Authorization Code grant
Threat Research - Sophos
From Security Operations to Security Leadership: Sophos CISO Advantage
Malicious use of virtual machine infrastructure
Sophos Workspace Protection Enables Safe GenAI Adoption
Threat Intelligence Executive Report – Volume 2025, Number 6
From Security Operations to Security Leadership: Sophos CISO Advantage
Sophos AI Agents: Accelerating MDR and Powering the Agentic SOC
Malicious use of virtual machine infrastructure
Sophos Protected Browser Early Access and FAQ
Microsoft Office vulnerability (CVE-2026-21509) in active exploitation
High Five: Sophos Named a 2026 Gartner® Peer Insights™ Customers' Choice for Endpoint Protection Platforms
PortSwigger Research
Top 10 web hacking techniques of 2025
Top 10 web hacking techniques of 2025: call for nominations
The Fragile Lock: Novel Bypasses For SAML Authentication
Introducing HTTP Anomaly Rank
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes
Inline Style Exfiltration: leaking data with chained CSS conditionals
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
HTTP/1.1 must die: the desync endgame
Repeater Strike: manual testing, amplified
Google Project Zero
AI Research - Sophos
From Security Operations to Security Leadership: Sophos CISO Advantage
Malicious use of virtual machine infrastructure
Threat Intelligence Executive Report – Volume 2025, Number 6
From Security Operations to Security Leadership: Sophos CISO Advantage
Sophos AI Agents: Accelerating MDR and Powering the Agentic SOC
Sophos Workspace Protection Enables Safe GenAI Adoption
Malicious use of virtual machine infrastructure
Sophos Protected Browser Early Access and FAQ
Microsoft Office vulnerability (CVE-2026-21509) in active exploitation
High Five: Sophos Named a 2026 Gartner® Peer Insights™ Customers' Choice for Endpoint Protection Platforms
Unit 42
Nation-State Actors Exploit Notepad++ Supply Chain
A Peek Into Muddled Libra’s Operational Playbook
Novel Technique to Detect Cloud Threat Actor Operations
The Shadow Campaigns: Uncovering Global Espionage
Why Smart People Fall For Phishing Attacks
Privileged File System Vulnerability Present in a SCADA System
Understanding the Russian Cyberthreat to the 2026 Winter Olympics
Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time
DNS OverDoS: Are Private Endpoints Too Private?
Talos Intelligence
Hand over the keys for Shannon’s shenanigans
Ryan Liles, master of technical diplomacy
New threat actor, UAT-9921, leverages VoidLink framework in campaigns
Microsoft Patch Tuesday for February 2026 — Snort rules and prominent vulnerabilities
All gas, no brakes: Time to come to AI church
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
I'm locked in!
Microsoft releases update to address zero-day vulnerability in Microsoft Office
Dissecting UAT-8099: New persistence mechanisms and regional focus
IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations
© 2026 RiskDiscovery | Sponsored by:
Deception Logic