Cybersecurity
Cybersecurity
Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
...
Hardware Releases
Podcast #847 – Micron Kills Off Crucial, AM5 Budget Build Sadness, Ryzen 9850X3D Leak, Plex, Shady Panda and MORE
Yes, we talked about DDR5 pricing a lot, again. But we also talked about a very special Intel...
Software Updates & Reviews
Fix “This video format is not supported” on YouTube TV
Setting up a new computer is bliss -- no old, unused apps and the machine performs much better...
Tech Trends & Innovations
Skeet Ulrich Reveals the ‘Scream’ Reboots’ Original Endgame
The Scream franchise came...
Jason’s Pen Test – Darknet Diaries
Full Transcript
Join us as we sit down with Jason Haddix, a renowned penetration tester who has made a name for...
What if your romantic AI chatbot can’t keep a secret?
Does your chatbot know too much? Here's why you should think twice...
Weekly Update 478
This week, it was an absolute privilege to be at Europol in The Hague, speaking about cyber offenders and at the InterCOP conference and...
November Patch Tuesday does its chores – Sophos News
Microsoft on Tuesday announced 63 patches affecting 13 product families. Four of the addressed issues are considered by Microsoft to be of Critical severity,...
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
î ‚Nov 15, 2025î „Ravie LakshmananMalware / Vulnerability
The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that...
A CISO playbook – Sophos News
The North Korean worker scheme has expanded into a global threat. Although it originally focused on U.S. technology companies, the scheme has spread to...

