Cybersecurity
Cybersecurity
Jason’s Pen Test – Darknet Diaries
Full Transcript
Join us as we sit down with Jason Haddix, a renowned penetration tester who has made a name for himself by uncovering vulnerabilities in...
Hardware Releases
Get a Creality 3D printer at an all-time low pricing until Christmas — up to $300 off K2 series with CFS bundle
Creality has put three of its most popular 3D printer models on sale this holiday season, with the...
Software Updates & Reviews
The Reformist CTO’s Guide to Impact Intelligence
Impact Intelligence is the title of my latest book. It explains how
to improve awareness...
Welcome To Video – Darknet Diaries
Full Transcript
Andy Greenberg brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to...
Find your weak spots before attackers do
Here’s how open-source intelligence helps trace your digital footprint and uncover your...
Weekly Update 479
I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and...
WhatsApp compromise leads to Astaroth deployment – Sophos News
Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked...
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform...
Advancing Cybersecurity for Microsoft Environments – Sophos News
I’m pleased to share three significant updates that advance cybersecurity for organizations that rely on Microsoft technologies. These milestones expand the reach of Sophos’...

