Cybersecurity

Full Transcript Andy Greenberg brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child sexual abuse...
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025...

Home Assistant + Ubiquiti + AI = Home Automation Magic

It seems like every manufacturer of anything electrical that goes in the...

Velociraptor incident response tool abused for remote access – Sophos News

In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital forensics and incident response...

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. "Unlike...

Modern vehicles: the cybersecurity trends

Modern vehicles are transforming into full-fledged digital devices that offer a multitude of features, from common smartphone-like conveniences to complex intelligent systems and services...

Reading Location Position Value in Microsoft Word Documents

While studying for the GX-FE , I started exploring the "Position" value in the registry that helps to tell Microsoft Word where you "left...

SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security

A 20-year-old Florida man at the center of a prolific cybercrime group known as “Scattered Spider” was sentenced to 10 years in federal prison...

Europol says Telegram post about 50,000 Qilin ransomware award is fake

It's not unusual for law enforcement agencies to offer substantial rewards for information which might lead to the identification, arrest, and conviction of cybercriminals.For...

Sam the Vendor – Darknet Diaries

Full Transcript Sam Bent, a.k.a. DoingFedTime, brings us a story of what it was like being a darknet market vendor. Support for...

‘What happens online stays online’ and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting...

Weekly Update 465

How much tech stuff do I have sitting there in progress, literally just within arm's reach? I kick off this week's video going through...

August Patch Tuesday includes blasts from the (recent) past – Sophos News

Microsoft on Tuesday announced 109 patches affecting 16 product families. Eighteen of the addressed issues are considered by Microsoft to be of Critical severity,...

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

Aug 19, 2025Ravie LakshmananSupply Chain Security The maintainers of the Python Package Index (PyPI) repository have announced that the package manager now checks for expired...

Recent articles