Proofpoint analysts have discovered a large-scale campaign in which hackers breach transportation companies and logistics operators to intercept real shipments and steal physical goods. The attacks result in multimillion-dollar losses and serious disruptions to supply chains.
CONTINUE READING 🡒 Month: 2 hours ago
Task Manager won’t close after a Windows update
After installing the October optional update KB5067036 on Windows 11, an issue occurs: Task Manager stops closing properly. The bug leads to an accumulation of background taskmgr.exe processes, which can seriously degrade system performance.
CONTINUE READING 🡒 Rooted Android! Why root Android in 2025?
This article explains why it makes sense to root your Android phone in 2025. You will learn about real benefits a rooted smartphone can bring and why rooting isn’t a relic of the Android 5 and CyanogenMod era.
CONTINUE READING 🡒 Espruino Pico: Program a USB Microcontroller in JavaScript and Build…
Despite the flood of microcontroller-based gadgets that rode the wave of Arduino’s success, only a handful use a USB flash drive form factor that plugs directly into a computer’s USB Type‑A port. One of the more intriguing…
CONTINUE READING 🡒 SesameOp backdoor uses the OpenAI Assistants API in attacks
Microsoft researchers have discovered a new backdoor, SesameOp, which uses the OpenAI Assistants API as a covert channel to communicate with its command-and-control servers.
CONTINUE READING 🡒 Amazon to block pirated apps on Fire TV Stick devices
Amazon plans to block unauthorized apps on Fire TV Stick devices in an effort to combat piracy. The new measures are intended to put an end to the era of using modified Fire TV Sticks for free…
CONTINUE READING 🡒 Android 8 Oreo Security: All the New Protection Features Explained
Android 8 is arguably the most significant Android update in years. Oreo introduced a modular architecture that allows OS components to be updated independently, a system that limits apps’ background activity to extend battery life, and a…
CONTINUE READING 🡒 Memento Labs chief (formerly Hacking Team) confirmed that security researchers…
The head of the Italian company Memento Labs (formerly Hacking Team), Paolo Lezzi, confirmed to the media that the Dante spyware, recently discovered by Kaspersky Lab researchers in real-world attacks, does indeed belong to his company. Lezzi…
CONTINUE READING 🡒 Windows 0-day exploited to hack European diplomats
The China-linked hacking group UNC6384 (aka Mustang Panda) is conducting a large-scale cyber-espionage campaign targeting European diplomatic and government entities. According to Arctic Wolf and StrikeReady, the hackers are exploiting an unpatched Windows vulnerability related to LNK…
CONTINUE READING 🡒 Security plugin for WordPress exposed users’ personal data
A vulnerability was discovered in the Anti-Malware Security and Brute-Force Firewall plugin for WordPress that allows minimally privileged users to read arbitrary files on the server. The plugin is installed on more than 100,000 sites, but so…
CONTINUE READING 🡒 Top 5 DevOps Tools Every Engineer Should Know
It’s hard to imagine modern software development without a DevOps engineer who bridges development, deployment, testing, and ongoing support. To deliver a quality product, every process has to be automated and monitored. And that’s where specialized tooling…
CONTINUE READING 🡒 Hackers Attack Telecommunications Company Ribbon Communications
U.S. telecommunications company Ribbon Communications reported a compromise of its IT network, potentially involving hackers acting on behalf of a foreign state. The incident began in December 2024 but was only discovered nine months later, in September…
CONTINUE READING 🡒 Leak reveals which Pixel phones are vulnerable to Cellebrite tools
The outlet 404 Media drew attention to a leak posted on the GrapheneOS forums. An anonymous insider using the handle rogueFed published screenshots from a closed Cellebrite briefing for law enforcement. The images show which Google Pixel…
CONTINUE READING 🡒 Zimperium: Over 760 malicious NFC apps for Android active in…
Experts at Zimperium warn of a rise in NFC malware for Android in Eastern Europe. Over the past few months, researchers have discovered more than 760 such apps using NFC attacks to steal users’ payment data.
CONTINUE READING 🡒 E‑Book DRM Explained: How Digital Books Are Protected and How…
Adobe, Amazon, Barnes & Noble — all of these companies invest heavily in protecting e‑books from copying and online distribution. Yet every time, someone finds a way to bypass or crack those protections. How does DRM work,…
CONTINUE READING 🡒 Minimal Linux x86 Bind Shell Shellcode: Building a 44-Byte Payload
You probably know that almost every exploit includes so‑called shellcode that runs when the exploit triggers. It might seem like writing shellcode is only for the chosen few, but it’s not as daunting as it looks. In…
CONTINUE READING 🡒 How to Troubleshoot and Fix Bluetooth Headphone Issues on Linux
Getting sound working on Linux has never been straightforward, and adding wireless headphones makes it a bit more complicated. That said, on modern distributions you can usually fix it by installing a few extra packages.
CONTINUE READING 🡒 TrueOS Review: The Desktop Edition of FreeBSD
“An inexplicably still-walking corpse” — that’s roughly how people tend to talk about FreeBSD these days. The hype around Linux and the GPL did its job, pushing what was once the most popular server OS to the…
CONTINUE READING 🡒 TempleOS Demystified: Understanding the “Divine” Operating System and Avoiding Common…
Hello, my brother! Today we’re going to explore one of the most intriguing operating systems of our time. TempleOS is only 17.5 MB, compiles on the fly, includes the full text of the Bible, supports 64-bit multi-core…
CONTINUE READING 🡒 How Law Enforcement Cracks Passwords: Tools and Techniques Used Against…
Hackers, fraudsters, security professionals, law enforcement, and intelligence agencies—all of them, under the right circumstances, may try to access information protected by passwords. And while the tools used by hackers and government agencies are largely the same,…
CONTINUE READING 🡒 