Author Archives: [email protected]

Microsoft leadership team’s one-third bonus will now depend on cybersecurity performance

Microsoft Board today announced changes to the compensation strucuture of top Microsoftexecutives on the Senior Leadership Team (SLT). In order to improve the overall security of Microsoft’s productd and services, from July 1, one-third of the individual performance bonus for each SLT member’s bonus will depend exclusively on the Compensation Committee’s assessment of the executive’s […]

Opera web browser now available as a native app for Windows on ARM

Last month, Opera released the developer version of their web browser as a native app for Windows on ARM. Today, Opera One, their flagship browser, is available as a native app for Windows on ARM. This ARM native browser will deliver faster and better optimized browsing experience for Opera One users. Also this new ARM-optimized […]

Minecraft accounts deleted by Microsoft for not migrating from Mojang, sparks rage among users

Minecraft, which is also getting a Netflix series, players are up in arms after Microsoft reportedly deleted a number of accounts that weren’t migrated to the company’s new system by the end of 2023. Users who log in with their old Mojang accounts are finding them permanently inaccessible, with no option for recovery or contacting […]

Podcastle Review: Can It Simplify Podcast Production?

In this Podcastle review, I’ll show you all the core features that (maybe) make it one of the most simple yet effective platforms for podcast production. If you’ve never made a podcast, you can also find a useful tutorial on how to do it with Podcastle. I’ve also included a breakdown of pricing (you can […]

New Attack Technique ‘Sleepy Pickle’ Targets Machine Learning Models

The security risks posed by the Pickle format have once again come to the fore with the discovery of a new “hybrid machine learning (ML) model exploitation technique” dubbed Sleepy Pickle. The attack method, per Trail of Bits, weaponizes the ubiquitous format used to package and distribute machine learning (ML) models to corrupt the model […]

Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware

The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized Android apps to deliver a spyware strain dubbed AridSpy. “The malware is distributed through dedicated websites impersonating various messaging apps, a job opportunity app, and a Palestinian Civil Registry app,” ESET researcher Lukáš Štefanko said in a […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.