Cybersecurity
Cybersecurity
D3f4ult – Darknet Diaries
Full Transcript
This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted...
Hardware Releases
Hacker plants three strains of malware in a Steam Early Access game called Chemia — security company found crypto-jacking infostealers and a backdoor to...
Sometimes getting more than what you asked for is nice. Finding cash in a jacket you haven't worn...
Industry Events & Conferences
How to Assess Your Event’s Carbon Footprint (Without Becoming a Carbon Accountant)
Record-breaking heatwaves in Southern Europe. Wildfires forcing evacuations in Canada and California. Floods and storms disrupting transportation, power...
Tech Trends & Innovations
Trump’s Anti-Bias AI Order Is Just More Bias
On November 2, 2022, I attended a Google AI event in New York City. One of the themes...
Gaming & Graphics
Fallout Director Is Producing A Wolfenstein Series For Amazon
Nazis, watch out. Wolfenstein is coming to the small screen with some help from the same people (and...
February Patch Tuesday delivers 57 packages – Sophos News
Microsoft on Tuesday released 57 patches touching 13 product families. Two of the addressed issues are considered by Microsoft to be of Critical severity,...
Assessing the Risks Before Deployment
Feb 11, 2025The Hacker NewsSoftware Security / Threat Intelligence
Imagine you're considering a new car for your family. Before making a purchase, you evaluate its...
Sophos named a Gartner® Peer Insights™ Customers’ Choice for Managed Detection and Response (MDR) Services for the 2nd time – Sophos News
For most organizations, the complexity and cost of recruiting, training, and retaining a highly skilled team of security operations analysts is a significant challenge....
What “Nigerian” spam looks like in the mid-2020s
“Nigerian” spam is a collective term for messages designed to entice victims with alluring offers and draw them into an email exchange with scammers,...
SSL 2.0 turns 30 this Sunday… Perhaps the time has come to let it die?
The SSL 2.0 protocol was originally published back in February of 1995, and although it was quickly found to have significant security weaknesses, and...
Thailand cuts power and internet to areas of Myanmar to disrupt scam gangs
The government of Thailand has cut the power supply to areas near its border with Myanmar that are known to host brutal scam compounds....