Cybersecurity
Tech Trends & Innovations
5 Best Mushroom Gummies (2025), WIRED-Tested and Approved
Plant People’s WonderDay Mushroom Gummies are sugar-free but taste like candy. Made with a blend of eight functional...
Gaming & Graphics
Rally Point: An immense frustration test almost overshadows Burden of Command’s narrative success
The Rally Point is a regular...
Cybersecurity
Desktop and IoT threat statistics for Q1 2025
IT threat evolution in Q1 2025. Non-mobile statisticsIT threat evolution in Q1 2025. Mobile statistics
The statistics in this...
Hardware Releases
Share Wi-Fi Network Passwords Using QR Codes
A neat feature built into iOS, iPadOS, and macOS is that when you are connected to a Wi-Fi...
ESET APT Activity Report Q2 2024–Q3 2024
ESET Research, Threat Reports
An overview of the activities of selected APT groups...
Experimenting with Stealer Logs in Have I Been Pwned
TL;DR — Email addresses in stealer logs can now be queried in HIBP...
Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS – Sophos News
Back in August 2022, Sophos X-Ops published a white paper on multiple attackers – that is, adversaries targeting the same organizations multiple times. One...
Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
Jan 13, 2025Ravie LakshmananVulnerability / Cloud Security
A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation...
The Sophos Active Adversary Report – Sophos News
It’s not news that 2024 has been a tumultuous year on many fronts. For our second Active Adversary Report of 2024, we’re looking specifically...
The EAGERBEE backdoor may be related to the CoughingDown actor
Introduction
In our recent investigation into the EAGERBEE backdoor, we found that it was being deployed at ISPs and governmental entities in the Middle East....