If the word “radio” only brings to mind grandpa’s old Grundig or a Soviet Okean set, that’s a pretty narrow view. We live in an age of wireless devices, the Internet of Things, 5G, and all sorts…
CONTINUE READING 🡒 The PipeMagic backdoor is active again and exploiting new vulnerabilities
Experts from Kaspersky Lab and BI.ZONE have warned about the activity of the PipeMagic backdoor. Kaspersky Lab notes the malware’s evolution and key changes in the operators’ tactics, while BI.ZONE conducted a technical analysis of the CVE-2025-29824…
CONTINUE READING 🡒 Mozilla warns: ad blockers may become illegal in Germany
Mozilla representatives report that a recent decision by Germany’s Federal Court of Justice (BGH) revives an old legal dispute over whether browser-based ad blockers infringe copyright. The organization fears that this could potentially lead to such tools…
CONTINUE READING 🡒 Vim for Beginners: Stop Fearing the Editor You Can’t Exit…
Vim is one of the most polarizing tools ever made. It’s not just an editor—it’s a litmus test that neatly divides programmers, admins, and Unix die-hards into insiders and outsiders. While some ask why we still need…
CONTINUE READING 🡒 Source Code of the ERMAC Banking Trojan Has Leaked
Information security specialists from Hunt Intelligence have discovered a leak of the source code of the ERMAC 3.0 Android banking trojan. The researchers also report finding serious shortcomings in the malware operators’ infrastructure.
CONTINUE READING 🡒 How to Set Up Zentyal 5.0: Free All‑in‑One Linux Server…
I was once asked to provision and configure a server remotely for a small company with about 30 workstations. I went with Zentyal—an Ubuntu-based distribution purpose-built for servers in small and medium-sized corporate networks. I’ll use this…
CONTINUE READING 🡒 Anthropic: Claude will be able to interrupt potentially harmful conversations
Anthropic has announced new capabilities that will allow some of its latest models to end conversations in “rare, extreme cases of persistently harmful or abusive interactions with users.” At the same time, Anthropic states that this is…
CONTINUE READING 🡒 U.S. sanctions Grinex crypto exchange, successor to Garantex
U.S. authorities have imposed sanctions on Grinex — the successor to the Garantex cryptocurrency exchange, which had previously come under sanctions and was allegedly linked to darknet marketplaces and helped criminals launder money.
CONTINUE READING 🡒 Hacking with Google: Up-to-Date Google Dork Queries for OSINT and…
Penetration tests usually rely on a toolkit of specialized utilities, but one of them is available to everyone and always at your fingertips—Google. You just need to know how to use it. Google dork queries are clever…
CONTINUE READING 🡒 GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks
Modern graphics cards are essentially compact supercomputers, delivering several teraflops of performance. A multi-GPU setup fits on a desk and can quickly crack most encrypted files. Where you once had to buy and configure a stack of…
CONTINUE READING 🡒 Android vs iOS Security: Is Android Actually Safer?
Strange headline, isn’t it? The author must be nuts to compare iOS security—something even the FBI can’t crack—with that leaky bucket called Android. But I’m serious: Android and iOS can, and should, be compared. Not to prove…
CONTINUE READING 🡒 Privacy Showdown: Comparing the Most Secure Browsers
Web browsers collect a lot of data about users and track their activity online. To counter that, there are dedicated privacy browsers built to protect your privacy and block tracking and ads. Today we’ll review and compare…
CONTINUE READING 🡒 Beyond Packet Sniffers: How to Choose the Right Tool for…
There’s a lot of interesting stuff to be found in network packets. To capture and analyze traffic, we use packet sniffers—and there are plenty to choose from. Today, we’ll look at the most popular sniffers for Windows.
CONTINUE READING 🡒 The HTTP/2 “MadeYouReset” vulnerability can be used for large-scale DDoS…
A vulnerability dubbed MadeYouReset has been discovered in several HTTP/2 implementations. This issue can be used to carry out powerful DDoS attacks.
CONTINUE READING 🡒 Media: The U.S. is secretly embedding trackers in shipments of…
According to media reports, U.S. authorities are secretly placing location-tracking devices in batches of chips that could be illegally diverted to China. The trackers are reportedly being used in shipments of equipment from Dell, SuperMicro, Nvidia, and…
CONTINUE READING 🡒 FPGA Fundamentals: Inside Programmable Logic Architecture and Key Advantages
Imagine a processor that, instead of executing a fixed set of instructions, reconfigures itself for each program and turns the algorithm directly into hardware. That’s exactly how FPGAs work! In this article, I’ll explain how that’s possible…
CONTINUE READING 🡒 F6 researchers analyzed Kinsing group attacks against Russian companies
In the second quarter of 2025, researchers observed a wave of attacks against Russian companies in the finance, logistics, and telecom sectors. Behind these attacks was the Kinsing hacking group (aka H2Miner and Resourceful Wolf), whose goal…
CONTINUE READING 🡒 Turkish crypto exchange BtcTurk suspends operations over suspected $49 million…
The popular Turkish cryptocurrency platform BtcTurk has temporarily suspended deposits and withdrawals after cybersecurity specialists from several different companies detected suspicious outflows totaling $49 million.
CONTINUE READING 🡒 Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for…
Over the years, Windows has evolved from a graphical shell on top of MS-DOS into a client front end for Microsoft’s cloud services. Turning it into a fully self-sufficient OS is probably unrealistic, but with some deep…
CONTINUE READING 🡒 Gemini may have exposed user data via Google Calendar
Google developers have fixed a bug that allowed malicious Google Calendar invitations to remotely take control of Gemini agents running on a victim’s device and steal user data.
CONTINUE READING 🡒