Hack Exposes Kansas City’s Secret Police Misconduct List

In 2011, after months of complaints from residents about the department’s SWAT team—broken TVs, missing cash,…

How to Hack a Poker Game

Michael Calore: Yeah. My favorite indiscreet product placement was in the show Entourage from HBO. It…

ICE Wants to Build a Shadow Deportation Network in Texas

US Immigration and Customs Enforcement is exploring plans to launch a privately-run, statewide transportation system in…

NASA’s Quiet Supersonic Jet Takes Flight

The X-59 will generate a lower “sonic thump” thanks to its unique design. It was given…

Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution

A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It…

Hidden links: why your website traffic is declining

When analyzing the content of websites in an attempt to determine what category it belongs to,…

Malicious package with AdaptixC2 framework agent found in npm registry

Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative…

Cyberespionage campaign PassiveNeuron targets machines running Windows Server

Introduction Back in 2024, we gave a brief description of a complex cyberespionage campaign that we…

Notable email phishing techniques in 2025

Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat actors keep coming up…

The BetterBank DeFi protocol exploited for reward minting

Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on…