Cybersecurity
Cybersecurity
Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
...
Hardware Releases
Podcast #847 – Micron Kills Off Crucial, AM5 Budget Build Sadness, Ryzen 9850X3D Leak, Plex, Shady Panda and MORE
Yes, we talked about DDR5 pricing a lot, again. But we also talked about a very special Intel...
Software Updates & Reviews
Fix “This video format is not supported” on YouTube TV
Setting up a new computer is bliss -- no old, unused apps and the machine performs much better...
Tech Trends & Innovations
Skeet Ulrich Reveals the ‘Scream’ Reboots’ Original Endgame
The Scream franchise came...
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’ – Krebs on Security
A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year by regularly stealing data from and publicly mass extorting...
State-backed spyware attacks are targeting Signal and WhatsApp users, CISA warns
CISA, the US Cybersecurity and Infrastructure Security Agency, has issued a new warning that cybercriminals and state-backed hacking groups are using spyware to compromise...
Gollumfun (Part 2) – Darknet Diaries
Full Transcript
Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story...
What parents should know to protect their children from doxxing
Online disagreements among young people can easily spiral out of control. Parents...
Weekly Update 479
I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and...
WhatsApp compromise leads to Astaroth deployment – Sophos News
Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked...

