Cybersecurity
Cybersecurity
How to hack a prison, and the hidden threat of online checkouts • Graham Cluley
A literal insider threat: we head to a Romanian prison where “self-service” web kiosks allowed inmates to run wild. Then we...
Hardware Releases
Secretlab Magnus Evo Hands-on — a trimmed-down version of its popular, premium sit-stand desk
Secretlab is one of the biggest names in premium gaming office hardware, and now the company is back...
Industry Events & Conferences
Meet Coplanner: The AI That Gets Events
The events industry is burning out its best people. While 89% of professionals report staffing shortages impacting their...
Software Updates & Reviews
Lessons from Vienna’s Café Culture
Today’s web is not always an amiable place. Sites greet you with a popover that demands assent to...
Tech Trends & Innovations
Simplifying the AI stack: The key to scalable, portable intelligence from cloud to edge
Presented by ArmA simpler software stack is the key to portable, scalable AI across cloud and edge. AI...
How to hack a prison, and the hidden threat of online checkouts • Graham Cluley
A literal insider threat: we head to a Romanian prison where “self-service” web kiosks allowed inmates...
Sam the Vendor – Darknet Diaries
Full Transcript
Sam Bent, a.k.a. DoingFedTime, brings us a story of what it was like being a darknet market vendor.
Support for...
Are cybercriminals hacking your systems – or just logging in?
As bad actors often simply waltz through companies’ digital front doors with...
Troy Hunt: Weekly Update 473
This week's video was recorded on Friday morning Aussie time, and as...
Threat Intelligence Executive Report – Volume 2025, Number 5 – Sophos News
The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™...
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware...