Author Archives: [email protected]

U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown

The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 32 internet domains used by a pro-Russian propaganda operation called Doppelganger as part of a sweeping set of actions. Accusing the Russian government-directed foreign malign influence campaign of violating U.S. money laundering and criminal trademark laws, the agency called out companies Social Design […]

Opera GX vs Chrome – Which is the Best Browser in 2024

Chrome might be the most used browser, but Opera GX is growing in popularity due to its gaming features and optimized performance. I put Opera GX vs Chrome in a head-to-head battle to see which comes out on top in 2024. Opera GX vs Chrome – Features Chrome is a great all-rounder and Opera GX […]

NIST Cybersecurity Framework (CSF) and CTEM – Better Together

It’s been a decade since the National Institute of Standards and Technology (NIST) introduced its Cybersecurity Framework (CSF) 1.0. Created following a 2013 Executive Order, NIST was tasked with designing a voluntary cybersecurity framework that would help organizations manage cyber risk, providing guidance based on established standards and best practices. While this version was originally

Good news for developers. Windows App SDK 1.6 now supports native AOT for faster apps

It’s that time, once again. Microsoft has finally released the Windows App SDK 1.6 version, with a few improvements here and there compared to its predecessor. Windows App SDK 1.6 finally supports native AOT (Ahead-Of-Time) compilation. That means, the update can reduce app startup time and memory usage, as the apps are compiled ahead of […]

Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore

Threat actors are likely employing a tool designated for red teaming exercises to serve malware, according to new findings from Cisco Talos. The program in question is a payload generation framework called MacroPack, which is used to generate Office documents, Visual Basic scripts, Windows shortcuts, and other formats for penetration testing and social engineering assessments. […]