Cybersecurity
Cybersecurity
Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
...
Hardware Releases
Podcast #847 – Micron Kills Off Crucial, AM5 Budget Build Sadness, Ryzen 9850X3D Leak, Plex, Shady Panda and MORE
Yes, we talked about DDR5 pricing a lot, again. But we also talked about a very special Intel...
Software Updates & Reviews
Fix “This video format is not supported” on YouTube TV
Setting up a new computer is bliss -- no old, unused apps and the machine performs much better...
Tech Trends & Innovations
Skeet Ulrich Reveals the ‘Scream’ Reboots’ Original Endgame
The Scream franchise came...
The AI hype train, space data centers, and lifelike robot heads • Graham Cluley
In episode 72 of The AI Fix, GPT-5’s “secret sauce” turns out to be phrases from...
Oak Cliff Swipers – Darknet Diaries
Full Transcript
He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens...
Petya/NotPetya copycat with UEFI Secure Boot bypass
ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware,...
Court Injunctions are the Thoughts and Prayers of Data Breach Response
You see it all the time after a tragedy occurs somewhere, and...
WhatsApp Worm Targets Brazilian Banking Customers – Sophos News
Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started...
The Evolution of UTA0388’s Espionage Malware
Oct 09, 2025Ravie LakshmananCyber Espionage / Artificial Intelligence
A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North...

