Cybersecurity
Gaming & Graphics
8BitDo Reveals NES 40th Anniversary Ultimate 2 Controller Bundle
Exactly 40 years ago today, the Nintendo Entertainment System hit store shelves in...
Hardware Releases
The Antec C8 Curve Wood Full Tower Doesn’t Bend But It Is Very Wide
Wood Is So Hot Right Now
The RGB phase has never left us, but the addition of real wood...
Industry Events & Conferences
What Is An Event Chatbot
In today’s Whiteboard Wednesday, we tackle the question: What is an event chatbot? Chatbots and digital assistants have become...
Software Updates & Reviews
Understanding Spec-Driven-Development: Kiro, spec-kit, and Tessl
I’ve been trying to understand one of the latest AI coding buzzword: Spec-driven development (SDD). I looked at...
Grifter – Darknet Diaries
Full Transcript
Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days...
Gamaredon X Turla collab
In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine.
Key points of this...
Troy Hunt: Weekly Update 471
I'm so happy to finally be getting those HIBP demos out! The...
HeartCrypt’s wholesale impersonation effort – Sophos News
Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes:
Malware impersonating, subverting, and...
Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive
Sep 25, 2025Ravie LakshmananZero-Day / Vulnerability
Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive...
What happens when a cybersecurity company gets phished? – Sophos News
If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a...