Cybersecurity
Cybersecurity
The BetterBank DeFi protocol exploited for reward minting
Executive summary
From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on the PulseChain network, fell victim to a sophisticated exploit involving liquidity manipulation and reward...
Hardware Releases
AMD’s flagship 9950X3D price drops back below $650
This Ryzen 9 processor just got $50 slashed off the asking price in latest Amazon deal...
Software Updates & Reviews
Introducing Coral NPU: A full-stack platform for Edge AI
Introducing Coral NPU, a full-stack, open-source platform designed to address the core performance, fragmentation,...
Gaming & Graphics
Topaz Labs brings generative AI video enhancement to AMD Radeon GPUs
Key takeaways
Diffusion-based video enhancement feature in Topaz Video™ runs locally on AMD Ryzen™ processors with AMD RDNA™...
We’re Backfilling and Cleaning Stealer Logs in Have I Been Pwned
I think I've finally caught my breath after dealing with those 23...
159-CVE January Patch Tuesday smashes single-month record – Sophos News
Microsoft on Tuesday released 159 patches touching 13 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity,...
Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language
Mar 01, 2025Ravie LakshmananPrivacy / Data Protection
Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following...
VEEAM exploit seen used again with a new ransomware: “Frag” – Sophos News
Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities...
Kaspersky SOC analyzes an incident involving a web shell used as a backdoor
Web shells have evolved far beyond their original purpose of basic remote command execution, and many now function more like lightweight exploitation frameworks. These...
Njrat Campaign Using Microsoft Dev Tunnels
I spotted new Njrat samples that (ab)use the Microsoft dev tunnels service to connect to their C2 servers. This is a service that allows developers...

