Information

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’

The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor’s high-speed Internet connection in the United States. This post examines the history and provenance of DSLRoot, one of the oldest “residential proxy” networks with origins in Russia and…

Read More

Investors beware: AI-powered financial scams swamp social media

Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think. Phil Muncaster 18 Aug 2025  •  , 4 min. read As economic uncertainty and persistent inflation are eroding our pay checks and imperilling our pensions, it’s not surprising that many of us are looking to make our money go a bit further. Unfortunately, scammers are preying on this need with increasingly sophisticated schemes on…

Read More

The need for speed: Why organizations are turning to rapid, trustworthy MDR

Business Security How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries Phil Muncaster 19 Aug 2025  •  , 5 min. read How long does it take for threat actors to move from initial access to lateral movement? Days? Hours? Unfortunately, the answer for many organizations is increasingly “minutes.” In fact, at 48 minutes, the average breakout time in 2024 was 22% shorter than the previous year,…

Read More

“What happens online stays online” and other cyberbullying myths, debunked

Kids Online Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment. Phil Muncaster 21 Aug 2025  •  , 5 min. read Cyberbullying, unfortunately, is on the rise. Data from the Cyberbullying Research Center reveals that just over 58% of middle- and high-school students in the US have experienced online harassment of some sort in their lives. That’s compared to 37%…

Read More

SIM-Swapper, Scattered Spider Hacker Gets 10 Years

A 20-year-old Florida man at the center of a prolific cybercrime group known as “Scattered Spider” was sentenced to 10 years in federal prison today, and ordered to pay roughly $13 million in restitution to victims. Noah Michael Urban of Palm Coast, Fla. pleaded guilty in April 2025 to charges of wire fraud and conspiracy. Florida prosecutors alleged Urban conspired with others to steal at least $800,000 from five victims via SIM-swapping attacks that diverted…

Read More

Oregon Man Charged in ‘Rapper Bot’ DDoS Service

A 22-year-old Oregon man has been arrested on suspicion of operating “Rapper Bot,” a massive botnet used to power a service for launching distributed denial-of-service (DDoS) attacks against targets — including a March 2025 DDoS that knocked Twitter/X offline. The Justice Department asserts the suspect and an unidentified co-conspirator rented out the botnet to online extortionists, and tried to stay off the radar of law enforcement by ensuring that their botnet was never pointed at…

Read More

Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme

Cybercriminal groups peddling sophisticated phishing kits that convert stolen card data into mobile wallets have recently shifted their focus to targeting customers of brokerage services, new research shows. Undeterred by security controls at these trading platforms that block users from wiring funds directly out of accounts, the phishers have pivoted to using multiple compromised brokerage accounts in unison to manipulate the prices of foreign stocks. Image: Shutterstock, WhataWin. This so-called ‘ramp and dump‘ scheme borrows…

Read More

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Two serious vulnerabilities were patched recently by Xerox in its FreeFlow Core print orchestration platform.  According to pentesting company Horizon3, whose researchers discovered the flaws, FreeFlow Core is affected by an XXE injection flaw (CVE-2025-8355) and a path traversal issue (CVE-2025-8356). The researchers discovered that the vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected FreeFlow Core instances. The potential impact has been demonstrated with an exploit that placed a webshell…

Read More

How the always-on generation can level up its cybersecurity game

Kids Online Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think Phil Muncaster 12 Aug 2025  •  , 5 min. read It’s International Youth Day on August 12, a moment to celebrate the contribution of young people to society. A big part of this contribution is digital, according to the United Nations, which also notes that “young people are leading the charge in digital…

Read More

Supply-chain dependencies: Check your resilience blind spot

Business Security Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them? Tony Anscombe 12 Aug 2025  •  , 4 min. read A panel discussion at DEF CON 33 last week, titled “Adversaries at war: Tactics, technologies, and lessons from modern battlefields”, offered several thought-provoking points, as well as a clear takeaway: while digital tactics such as misinformation and influence campaigns are useful in modern conflict,…

Read More