Ransomware gangs are exploiting AdaptixC2, an open-source command-and-control framework originally built for red team testing, to support stealthy post-exploitation operations.
The Russian hacker group Curly COMrades has been abusing Microsoft's Hyper-V virtualization technology in Windows to bypass ...
Blue Recorder is another basic screen recorder that's as effective as it is easy. Blue Recorder sits somewhere between Kooha and Simple Screen Recorder in terms of simplicity and features. With this ...
If you're looking for a minimalist Linux distribution that doesn't force specific apps on you and runs well, Synex might be the one.
Ubuntu Summit The Register FOSS desk sat down with Canonical's vice-president for engineering, Jon Seager, during Ubuntu Summit earlier this month. This is a heavily condensed version of our ...
October brought ghosts, ghouls — and a glut of great Linux app updates. Big hitters included Mozilla Firefox 144, Thunderbird ...
If you've been following my ramblings on Linux distros, you know I'm no stranger to hunting for that sweet spot between power ...
Ten malicious packages mimicking legitimate software projects in the npm registry download an information-stealing component ...
Ten typosquatted npm packages (Jul 4, 2025) delivered a 24MB PyInstaller info stealer using 4 obfuscation layers; ~9,900 ...
One of the headline items is the addition of ten new security tools to the Kali repositories. These tools reflect shifts in the field, toward AI-augmented recon, advanced wireless simulation and ...
Victims of the GhostCall campaign span several infected macOS hosts located in Japan, Italy, France, Singapore, Turkey, Spain ...
Turns out Java can do serverless right — with GraalVM and Spring, cold starts are tamed and performance finally heats up.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results