Cybersecurity
Cybersecurity
Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
...
Hardware Releases
Podcast #847 – Micron Kills Off Crucial, AM5 Budget Build Sadness, Ryzen 9850X3D Leak, Plex, Shady Panda and MORE
Yes, we talked about DDR5 pricing a lot, again. But we also talked about a very special Intel...
Software Updates & Reviews
Fix “This video format is not supported” on YouTube TV
Setting up a new computer is bliss -- no old, unused apps and the machine performs much better...
Tech Trends & Innovations
Skeet Ulrich Reveals the ‘Scream’ Reboots’ Original Endgame
The Scream franchise came...
How we linked ForumTroll APT to Dante spyware by Memento Labs
In March 2025, Kaspersky detected a wave of infections that occurred when users clicked on personalized phishing links sent via email. No further action...
SmartApeSG campaign uses ClickFix page to push NetSupport RAT
Introduction
This diary describes a NetSupport RAT infection I generated in my lab from the SmartApeSG campaign that used a ClickFix-style fake CAPTCHA page.
Known as ZPHP...
Drilling Down on Uncle Sam’s Proposed TP-Link Ban – Krebs on Security
The U.S. government is reportedly preparing to ban the sale of wireless routers and other networking gear from TP-Link Systems, a tech company that...
Hack halts Dutch broadcaster, forcing radio hosts back to LPs
A Dutch TV and radio broadcaster has found itself at the mercy of cybercriminals after suffering a cyber attack, and leaving it scrambling to...
Tanya – Darknet Diaries
Full Transcript
Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode,...
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose...

