Cybersecurity
Cybersecurity
Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
...
Hardware Releases
Podcast #847 – Micron Kills Off Crucial, AM5 Budget Build Sadness, Ryzen 9850X3D Leak, Plex, Shady Panda and MORE
Yes, we talked about DDR5 pricing a lot, again. But we also talked about a very special Intel...
Software Updates & Reviews
Fix “This video format is not supported” on YouTube TV
Setting up a new computer is bliss -- no old, unused apps and the machine performs much better...
Tech Trends & Innovations
Skeet Ulrich Reveals the ‘Scream’ Reboots’ Original Endgame
The Scream franchise came...
Aisuru Botnet Shifts from DDoS to Residential Proxies – Krebs on Security
Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative...
Spam text scammer fined £200,000 for targeting people in debt, after sending nearly one million messages
The UK Information Commissioner’s Office (ICO) has levied a fine of £200,000 (US $260,000) against a sole trader who sent almost one million spam...
Welcome To Video – Darknet Diaries
Full Transcript
Andy Greenberg brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to...
Preventing business disruption and building cyber-resilience with MDR
Given the serious financial and reputational risks of incidents that grind business...
How We (Almost) Found Chromium’s Bug via Crash Reports to Report URI
Tracking down bugs in software is a pain that all of us...
F5 network compromised – Sophos News
On October 15, 2025, F5 reported that a nation-state threat actor had gained long-term access to some F5 systems and exfiltrated data, including source...

