Cybersecurity
Cybersecurity
BlueNoroff’s latest campaigns: GhostCall and GhostHire
Introduction
Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38, Alluring Pisces, Stardust Chollima, and TA444) has adopted new infiltration strategies and malware sets over time,...
Hardware Releases
ASRock Z790 PG Lightning Motherboard Review: Cheap Z790?
ASRock’s Z790 PG Lightning is a motherboard designed to support 13th and 12th-generation Intel Core processors.Features1. Supports 13th...
Industry Events & Conferences
15+ Ways Gevme Coplanner Uses AI for Event Planning
Every event planner knows this truth: no matter how well you prepare, chaos finds a way in.
One last-minute...
Software Updates & Reviews
An Essential Value – A List Apart
Humility, a designer’s essential value—that has a nice ring to it. What about humility, an office manager’s essential...
Tech Trends & Innovations
Apple Plans to Use a Custom Model of Google’s Gemini AI to Power Siri, Report Says
Apple is turning to Google to make a custom Gemini AI model to power the next version of...
June Patch Tuesday digs into 67 bugs – Sophos News
.Microsoft on Tuesday released 67 patches affecting 12 product families. Ten of the addressed issues, five involving 365 and Office and one involving SharePoint,...
U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network
The U.S. Department of Justice (DoJ) said it has filed a civil forfeiture complaint in federal court that targets over $7.74 million in cryptocurrency,...
New BrowserVenom malware being distributed via fake DeepSeek phishing website
Introduction
DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels look for chatbot websites on search engines, and threat...
More Steganography! – SANS Internet Storm Center
I spotted another interesting file that uses, once again, steganography. It seems to be a trend (see one of my previous diaries). The file...
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs – Krebs on Security
Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious...

