DEFCON is Not What I Expected…
Join Chuck at Defcon, a hacker event where he explores the various villages and meets with attendees. From packet hacking to car hacking, Chuck delves into the world of...
Read moreSalesforce says some of its customers’ data was accessed after Gainsight breach
Salesforce confirmed an investigation into a breach affecting some customers’ data, linked to Gainsight apps that connect to its platform. The incident appears tied to Gainsight’s external connections rather...
Read moreHow the classic anime ‘Ghost in the Shell’ predicted the future of cybersecurity 30 years ago
The 30th-anniversary analysis of ‘Ghost in the Shell’ reveals how the 1989 manga’s cyberpunk narrative anticipated modern cybersecurity challenges. The Puppet Master, a government-backed hacker, mirrors real-world APTs and...
Read moreGoogle says hackers stole data from 200 companies following Gainsight breach
Google confirmed hackers stole data from over 200 companies through a supply chain attack involving Gainsight’s apps. The breach, linked to the Scattered Lapsus$ Hunters group, affected major firms...
Read moreA Major Leak Spills a Chinese Hacking Contractor’s Tools and Targets
The United States issued a seizure warrant to Starlink over satellite internet infrastructure used in a scam compound in Myanmar, as part of a larger law enforcement initiative. Google...
Read moreAustralian spy chief warns Chinese hackers are ‘probing’ critical networks for espionage and sabotage
Australia’s intelligence chief, Mike Burgess, has raised concerns about Chinese hackers probing the nation’s critical infrastructure, potentially leading to espionage and sabotage. He highlighted the involvement of two China-backed...
Read moreHow to Hack a Poker Game
The article explores the intersection of technology and entertainment through a podcast episode titled “Uncanny Valley.” It discusses how automated shufflers in private poker games can be hacked, emphasizing...
Read more






