Cybersecurity
Cybersecurity
BladedFeline: Whispering in the dark
In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT group behind the attacks is...
Hardware Releases
Best Motherboards for i9-9900K in 2025 (Top 5 Picks)
Most of the parts of a computer system are attached to the motherboard. You can overclock your processor...
Software Updates & Reviews
Autonomous coding agents: A Codex example
In the past few weeks, multiple “autonomous background coding agents” have been released.
Supervised coding agents: Interactive...
Tech Trends & Innovations
SAG-AFTRA board approves agreement with game companies on AI and new contract
The Screen Actors Guild-American Federation of Television and Radio Artists (SAG-AFTRA) National Board approved the tentative agreement with...
Gaming & Graphics
Crimson Desert’s Clunky RPG Action Made Me Crash Out
I’m trying to put all my thoughts about the time I spent with the medieval fantasy RPG Crimson...
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
May 31, 2025Ravie LakshmananVulnerability / Linux
Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat...
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News
Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...
Vulnerability landscape analysis for Q1 2025
The first quarter of 2025 saw the continued publication of vulnerabilities discovered and fixed in 2024, as some researchers were previously unable to disclose...
Adidas customers’ personal information at risk after data breach
Lovers of Adidas clothes would be wise to be on their guard against phishing attacks, after the German sportswear giant revealed that a cyber...
ANOM – Darknet Diaries
Full Transcript
In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...
Danabot under the microscope
ESET Research has been tracking Danabot’s activity since 2018 as part of...