In 2011, after months of complaints from residents about the department’s SWAT team—broken TVs, missing cash,…
Category: News
How to Hack a Poker Game
Michael Calore: Yeah. My favorite indiscreet product placement was in the show Entourage from HBO. It…
ICE Wants to Build a Shadow Deportation Network in Texas
US Immigration and Customs Enforcement is exploring plans to launch a privately-run, statewide transportation system in…
NASA’s Quiet Supersonic Jet Takes Flight
The X-59 will generate a lower “sonic thump” thanks to its unique design. It was given…
Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution
A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It…
Hidden links: why your website traffic is declining
When analyzing the content of websites in an attempt to determine what category it belongs to,…
Malicious package with AdaptixC2 framework agent found in npm registry
Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative…
Cyberespionage campaign PassiveNeuron targets machines running Windows Server
Introduction Back in 2024, we gave a brief description of a complex cyberespionage campaign that we…
Notable email phishing techniques in 2025
Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat actors keep coming up…
The BetterBank DeFi protocol exploited for reward minting
Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on…