Cybersecurity
Cybersecurity
BlueNoroff’s latest campaigns: GhostCall and GhostHire
Introduction
Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38, Alluring Pisces, Stardust Chollima, and TA444) has adopted new infiltration strategies and malware sets over time,...
Hardware Releases
ASRock Z790 PG Lightning Motherboard Review: Cheap Z790?
ASRock’s Z790 PG Lightning is a motherboard designed to support 13th and 12th-generation Intel Core processors.Features1. Supports 13th...
Industry Events & Conferences
15+ Ways Gevme Coplanner Uses AI for Event Planning
Every event planner knows this truth: no matter how well you prepare, chaos finds a way in.
One last-minute...
Software Updates & Reviews
An Essential Value – A List Apart
Humility, a designer’s essential value—that has a nice ring to it. What about humility, an office manager’s essential...
Tech Trends & Innovations
Apple Plans to Use a Custom Model of Google’s Gemini AI to Power Siri, Report Says
Apple is turning to Google to make a custom Gemini AI model to power the next version of...
This month in security with Tony Anscombe – May 2025 edition
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life...
Weekly Update 453
Well, the last few weeks of insane hours finally caught up with me 🤒 Not badly, but I evidently burned enough midnight oil to...
DragonForce targets rivals in a play for dominance – Sophos News
DragonForce is not just another ransomware brand – it’s a destabilizing force trying to reshape the ransomware landscape. Counter Threat Unit (CTU) researchers are...
Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore
May 28, 2025Ravie LakshmananRansomware / Data Breach
An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion...
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News
Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...
Dero miner spreads inside containerized Linux environments
Introduction
Imagine a container zombie outbreak where a single infected container scans the internet for an exposed Docker API, and bites exploits it by creating...

