Cybersecurity
Cybersecurity
Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
...
Hardware Releases
Podcast #847 – Micron Kills Off Crucial, AM5 Budget Build Sadness, Ryzen 9850X3D Leak, Plex, Shady Panda and MORE
Yes, we talked about DDR5 pricing a lot, again. But we also talked about a very special Intel...
Software Updates & Reviews
Fix “This video format is not supported” on YouTube TV
Setting up a new computer is bliss -- no old, unused apps and the machine performs much better...
Tech Trends & Innovations
Skeet Ulrich Reveals the ‘Scream’ Reboots’ Original Endgame
The Scream franchise came...
Exploring Uploads in a Dshield Honeypot Environment [Guest Diary]
The goal of this project is to test the suitability of various data entry points within the dshield ecosystem to determine which metrics are...
US citizen charged in latest twist of notorious data breach
The Vastaamo hack was the worst data breach in Finnish history.Psychotherapy clinic Vastaamo found itself the victim of an extortionist who hacked its systems...
The D.R. Incident – Darknet Diaries
Full Transcript
Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks...
A Petya/NotPetya copycat comes with a twist
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI...
Weekly Update 469
So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to...
September Patch Tuesday handles 81 CVEs – Sophos News
.Microsoft on Tuesday announced 81 patches affecting 15 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity,...

