Stay tuned

Subscribe to our latest newsletter and never miss the latest news!
Our newsletter is sent once a week, every Monday.

Upcoming Events

Developing a machine-learning model to detect DLL hijacking

DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used...

Avatar: The Last Airbender Is Getting Its Very Own Switch 2 Fighter Next Year

Well here's something that we weren't expecting. Fresh out of New York Comic Con 2025, we got our first peek at Avatar Legends: The...

Dutch government seizes local chipmaker from its Chinese owner — Nexperia parent company Wingtech preps response to ‘exceptional’ steps taken to safeguard ‘crucial technological...

The Dutch government has taken the "exceptional" step of seizing control of strategically important Dutch chip maker, Nexperia, from its Chinese owner, Wingtech, according...

Apple is winding down Clips, its forgotten video-editing app

It seems to be the end of the road for Apple's Clips app. The company said on a support page that it has stopped...

RedTail Observations from a Honeypot

.] Ransomware is often the first word that comes to mind when we think about cybercriminals chasing financial gain. It barges in, locks files,...

CPU Overclocking in 2026

One question we often get – is CPU overclocking still a thing, and do we recommend it? CPU overclocking – the manual process of...

Own your AI: Learn how to fine-tune Gemma 3 270M and run it on-device

Gemma is a collection of lightweight, state-of-the-art open...

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS – Krebs on Security

The world’s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet...

Bloodborne’s 744-Page Complete Guide Is Steeply Discounted This Weekend

From Software fans can pick up Bloodborne's Complete...