Cybersecurity
Cybersecurity
The HoneyMyte APT now protects malware with a kernel-mode rootkit
Overview of the attacks
In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old, stolen, or leaked digital certificate...
Software Updates & Reviews
Why You Should Choose Flutter for App Development
The importance of selecting the right software development...
Tech Trends & Innovations
Today’s NYT Connections Hints, Answers for Jan. 6 #940
Looking for the most recent Connections answers? Click here for today's Connections hints, as well as our daily...
Gaming & Graphics
Nintendo Renews Trademarks For 3DS And Wii U Games
Nintendo is regularly renewing its video game trademarks, and with this in mind, some trademarks have apparently been...
The HoneyMyte APT now protects malware with a kernel-mode rootkit
Overview of the attacks
In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old,...
Cryptocurrency Scam Emails and Web Pages As We Enter 2026
Introduction
In October 2025, a work colleague documented a cryptocurrency scam using a fake chatbot. After investigating this, I was able to receive messages from...
The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has...
The Kindle that got pwned • Graham Cluley
Think your Kindle is harmless? Think again! In this episode, we unpack a Black Hat Europe...
Gollumfun (Part 2) – Darknet Diaries
Full Transcript
Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story...
This month in security with Tony Anscombe – December 2025 edition
As 2025 draws to a close, Tony looks back at the cybersecurity...

