In this article, I’ll show you not only how to build your own WireGuard-based VPN service, but also how to configure it so all your friends can use it. And if you want, they can even chip…
CONTINUE READING 🡒 Tunnelblick vulnerability could be exploited even after uninstallation
Positive Technologies specialist Yegor Filatov discovered and helped fix a vulnerability in Tunnelblick (a graphical interface for OpenVPN). The issue allowed privilege escalation and data theft. Notably, it could be exploited even in cases of incomplete application…
CONTINUE READING 🡒 New wave of attacks by the PhantomCore cyber-espionage hacking group…
From May to July 2025, Positive Technologies specialists discovered more than 180 infected systems in Russian organizations. The malicious activity originated from the PhantomCore group and was targeted exclusively at Russia’s critical infrastructure.
CONTINUE READING 🡒 Quick Guide to Online Anonymity: Encryption Types, Traffic Protection, and…
Today, everyday users have access to a solid range of cryptographically robust encryption protocols and the software that implements them. In this article, we’ll survey the main categories of these solutions (even if many are already well…
CONTINUE READING 🡒 Authorities seize $2.8 million in cryptocurrency from a Zeppelin ransomware…
The U.S. Department of Justice announced the seizure of more than $2.8 million in cryptocurrency from alleged Zeppelin ransomware operator Yanis Aleksandrovich Antropenko.
CONTINUE READING 🡒 Intercepting and Decoding RF Remote Control Signals with SDR
If the word “radio” only brings to mind grandpa’s old Grundig or a Soviet Okean set, that’s a pretty narrow view. We live in an age of wireless devices, the Internet of Things, 5G, and all sorts…
CONTINUE READING 🡒 The PipeMagic backdoor is active again and exploiting new vulnerabilities
Experts from Kaspersky Lab and BI.ZONE have warned about the activity of the PipeMagic backdoor. Kaspersky Lab notes the malware’s evolution and key changes in the operators’ tactics, while BI.ZONE conducted a technical analysis of the CVE-2025-29824…
CONTINUE READING 🡒 Mozilla warns: ad blockers may become illegal in Germany
Mozilla representatives report that a recent decision by Germany’s Federal Court of Justice (BGH) revives an old legal dispute over whether browser-based ad blockers infringe copyright. The organization fears that this could potentially lead to such tools…
CONTINUE READING 🡒 Vim for Beginners: Stop Fearing the Editor You Can’t Exit…
Vim is one of the most polarizing tools ever made. It’s not just an editor—it’s a litmus test that neatly divides programmers, admins, and Unix die-hards into insiders and outsiders. While some ask why we still need…
CONTINUE READING 🡒 Source Code of the ERMAC Banking Trojan Has Leaked
Information security specialists from Hunt Intelligence have discovered a leak of the source code of the ERMAC 3.0 Android banking trojan. The researchers also report finding serious shortcomings in the malware operators’ infrastructure.
CONTINUE READING 🡒 How to Set Up Zentyal 5.0: Free All‑in‑One Linux Server…
I was once asked to provision and configure a server remotely for a small company with about 30 workstations. I went with Zentyal—an Ubuntu-based distribution purpose-built for servers in small and medium-sized corporate networks. I’ll use this…
CONTINUE READING 🡒 Anthropic: Claude will be able to interrupt potentially harmful conversations
Anthropic has announced new capabilities that will allow some of its latest models to end conversations in “rare, extreme cases of persistently harmful or abusive interactions with users.” At the same time, Anthropic states that this is…
CONTINUE READING 🡒 U.S. sanctions Grinex crypto exchange, successor to Garantex
U.S. authorities have imposed sanctions on Grinex — the successor to the Garantex cryptocurrency exchange, which had previously come under sanctions and was allegedly linked to darknet marketplaces and helped criminals launder money.
CONTINUE READING 🡒 Hacking with Google: Up-to-Date Google Dork Queries for OSINT and…
Penetration tests usually rely on a toolkit of specialized utilities, but one of them is available to everyone and always at your fingertips—Google. You just need to know how to use it. Google dork queries are clever…
CONTINUE READING 🡒 GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks
Modern graphics cards are essentially compact supercomputers, delivering several teraflops of performance. A multi-GPU setup fits on a desk and can quickly crack most encrypted files. Where you once had to buy and configure a stack of…
CONTINUE READING 🡒 Android vs iOS Security: Is Android Actually Safer?
Strange headline, isn’t it? The author must be nuts to compare iOS security—something even the FBI can’t crack—with that leaky bucket called Android. But I’m serious: Android and iOS can, and should, be compared. Not to prove…
CONTINUE READING 🡒 Privacy Showdown: Comparing the Most Secure Browsers
Web browsers collect a lot of data about users and track their activity online. To counter that, there are dedicated privacy browsers built to protect your privacy and block tracking and ads. Today we’ll review and compare…
CONTINUE READING 🡒 Beyond Packet Sniffers: How to Choose the Right Tool for…
There’s a lot of interesting stuff to be found in network packets. To capture and analyze traffic, we use packet sniffers—and there are plenty to choose from. Today, we’ll look at the most popular sniffers for Windows.
CONTINUE READING 🡒 The HTTP/2 “MadeYouReset” vulnerability can be used for large-scale DDoS…
A vulnerability dubbed MadeYouReset has been discovered in several HTTP/2 implementations. This issue can be used to carry out powerful DDoS attacks.
CONTINUE READING 🡒 Media: The U.S. is secretly embedding trackers in shipments of…
According to media reports, U.S. authorities are secretly placing location-tracking devices in batches of chips that could be illegally diverted to China. The trackers are reportedly being used in shipments of equipment from Dell, SuperMicro, Nvidia, and…
CONTINUE READING 🡒