Experts from Eclypsium demonstrated at DEF CON 33 an attack codenamed BadCam, which exploits vulnerabilities in certain Lenovo webcam models, turning them into tools for remote BadUSB-style attacks.
CONTINUE READING 🡒 Dozens of Docker Hub images remain infected with the XZ…
Analysts at Binarly have discovered at least 35 images on Docker Hub that are still infected with the backdoor that infiltrated xz Utils last year. The researchers warned that this potentially puts users, organizations, and their data…
CONTINUE READING 🡒 MikroTik Router Firewall Configuration: Step-by-Step Guide
The firewall is the first—and, unfortunately, in many cases the last—line of defense for a network. The internet is full of advice on how to configure it, but blindly copying someone else’s rules can do more harm…
CONTINUE READING 🡒 More than 29,000 Exchange servers are vulnerable to a serious…
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to full domain compromise.
CONTINUE READING 🡒 Security researcher awarded $250,000 for Chrome sandbox escape vulnerability
A security researcher going by the handle Micky received a record payout from Google. The specialist discovered a bug in Chrome that allows bypassing the browser’s sandbox and earned $250,000 through the bug bounty program.
CONTINUE READING 🡒 How to Choose and Configure an Ad Blocker to Stop…
The web is awash with ads, and the delivery tactics are getting more aggressive. Animated GIFs and Flash, iframes and pop-ups—that’s just the tip of the iceberg. Phishing redirects, trojans, and stealthy cryptojacking scripts that start mining…
CONTINUE READING 🡒 0-day WinRAR vulnerability used in phishing attacks
ESET specialists reported that a recently patched vulnerability in WinRAR (CVE-2025-8088) was used as a 0-day in phishing attacks and was leveraged to install RomCom malware.
CONTINUE READING 🡒 Google Ads Customer Data Leaked in Google Hack
Google representatives have confirmed that a recent data breach linked to the Salesforce hack affected Google Ads customer data.
CONTINUE READING 🡒 Exploring the Darknet: What You Can Find on the I2P…
I2P, the Invisible Internet Project, is arguably the most anonymous network available today. It lets you browse sites and use services without exposing a single byte of your information to third parties. Although I2P launched back in…
CONTINUE READING 🡒 60 malicious packages found on RubyGems, downloaded 275,000 times
On RubyGems, 60 malicious packages were discovered that masqueraded as harmless tools for automating social networks, blogs, and messengers. The gems stole users’ credentials and, since March 2023, have been downloaded more than 275,000 times.
CONTINUE READING 🡒 Stable Diffusion XL: Generate AI Images Locally on Your Computer
You’ve probably heard of Stable Diffusion—a neural network that generates images locally on your computer, with no cloud services or paid tokens. A new version just dropped: SDXL, short for “Extra Large.” In this article, we’ll install…
CONTINUE READING 🡒 Efimer steals cryptocurrency, hacks WordPress, and sends spam
Kaspersky Lab experts have observed a wave of attacks using the Efimer Trojan. The malware spreads via compromised WordPress sites, torrents, and email. Its primary goal is to steal and substitute cryptocurrency wallet addresses, but with additional…
CONTINUE READING 🡒 Wikipedia editors will quickly delete AI-generated articles
Wikipedia has adopted new rules to combat the flood of AI-generated articles inundating the online encyclopedia. Under the new policy, administrators are authorized to quickly delete AI-generated articles if they meet certain criteria.
CONTINUE READING 🡒 DIY Audio: How to Build Your Own Digital-to-Analog Converter (DAC)
This article will help you build your first—or maybe not your first?—digital-to-analog converter (DAC). You’ll have several designs to choose from, ranging from classic to pretty radical. Pick whatever suits you. There are even a couple of…
CONTINUE READING 🡒 How Phone Makers Ruin Android with Bloatware, Heavy Skins, and…
In one of our previous pieces, we took a deep dive into why iPhones have been—and will continue to be—faster than current Android flagships. The article sparked heated debate and mixed reactions. So we decided to expand…
CONTINUE READING 🡒 Modologic. Dissecting the Pathologic virtual machine
Many years ago, I was eager to understand how the game “Pathologic” actually works. But at that time, the format of its scripts was beyond my capacity. Today, I will show you how to crack the game engine to find out how its scripts operate.…
CONTINUE READING 🡒 Turning an Old Android Smartphone into a Fully Functional Home…
Imagine this scenario: you have an old Android smartphone. Its primary function is long gone – maybe the screen is shattered, the mobile connectivity module has died, or the device is simply outdated. Selling it for next…
CONTINUE READING 🡒 The Ultimate Guide to Android Performance Optimization
Running out of battery? Tired of sluggish apps? Don’t panic—and don’t rush to buy a new smartphone. Even a slow phone can be made snappier, and its battery life extended significantly. In this article, we’ll share a…
CONTINUE READING 🡒 Paper Werewolf Group Exploits WinRAR Vulnerabilities for Attacks
In July and early August 2025, the espionage hacking group Paper Werewolf attacked several organizations from Russia and Uzbekistan. The phishing emails had RAR archives attached, supposedly containing important documents, but in reality, they included malware. The…
CONTINUE READING 🡒 Creating a Bootable USB Drive with Arch Linux Live Image
Today, we will create a live USB drive with an Arch Linux installation image. By "live," I mean it will allow you to install and remove programs, modify any files, and save changes while in use. I've…
CONTINUE READING 🡒