Cybersecurity

Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective

Let’s face it—traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it’s over. Now, imagine cybersecurity training that’s as unforgettable as your favorite show. Remember how “Hamilton” made history come alive, or how “The Office” taught us […]

DJing

November 2024 Eurorack round-up

This month’s best new module releases include a rebooted classic from Buchla, an intriguing drone voice from Befaco and a versatile sequencer from Morphor. Buchla/Tiptop Audio 259t Newly reissued Tiptop/Buchla modules are always exciting, but the 259t might be the best yet. This groundbreaking complex oscillator module has been one of the most eagerly anticipated […]

Cybersecurity

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The “intriguing” campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. […]

Cybersecurity

CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that

Cybersecurity

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

A threat actor with ties to the Democratic People’s Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as

Cybersecurity

A Hacker’s Guide to Password Cracking

Defending your organization’s security is like fortifying a castle—you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for weaknesses, whether it’s a lax password policy or a forgotten backdoor. To build a stronger defense, you must think like a hacker and anticipate their […]

DJing

Allen & Heath Xone:92 MK2 review

Two decades in production and still going strong, the iconic Xone:92 gets its first major update. Greg Scarth recounts the history of this legendary mixer, and explores why the MK2 version keeps it relevant. The Xone:92 is already an icon of the DJ booth. First released in 2004, the 92 redefined what a DJ mixer […]