Cybersecurity
Cybersecurity
Analysis of the ToolShell vulnerabilities and exploit code
On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of on-premise SharePoint servers. According to the reports, observed attacks did not require authentication,...
Hardware Releases
Start your AM5 PC build with this Ryzen 7700X bundle deal at Amazon
A perfect budget starter kit for your next gaming PC build
Updated: Jul 26,...
Tech Trends & Innovations
iPhone 17 Release Date: Announcement, Pre-order, Launch Day Timing
While leaks and speculation about the new iPhone have been popping up everywhere lately, one question could resolve...
Gaming & Graphics
Team Fortress 2’s summer update is here, and a group of players have penned an open letter to Valve about matchmaking
Team Fortress 2, that shooter with...
DeceptiveDevelopment targets freelance developers
Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers....
We’re Backfilling and Cleaning Stealer Logs in Have I Been Pwned
I think I've finally caught my breath after dealing with those 23...
159-CVE January Patch Tuesday smashes single-month record – Sophos News
Microsoft on Tuesday released 159 patches touching 13 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity,...
Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language
Mar 01, 2025Ravie LakshmananPrivacy / Data Protection
Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following...
VEEAM exploit seen used again with a new ransomware: “Frag” – Sophos News
Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities...
Kaspersky SOC analyzes an incident involving a web shell used as a backdoor
Web shells have evolved far beyond their original purpose of basic remote command execution, and many now function more like lightweight exploitation frameworks. These...