CYBERSECURITY

    Microsoft Patch Tuesday, September 2025 Edition – Krebs on Security

    Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There…

    Ransomware recovery perils: 40% of paying victims still lose their data

    Cyber recovery Cyber recovery following a ransomware attack needs to be treated similarly to disaster recovery with a fully defined,…

    Weekly Update 469

    So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the…

    How to Migrate SVN to GIT with History?

    Today I’d like to share my solution for a common problem a lot of IT companies experience when finally moving…

    CyGO Entrepreneurs playbook, Glev Illustrated

    Hello, Cyber Builders 🖖 I’m closing out our July series on application security with a story that doesn’t follow the…

    $6 billion business couldn’t stop the breach

    On paper, a $6 billion food production company in the United States looked unwavering. Having a reliable global reputation, 10,000…

    A Journey to the Highest Cybersecurity Maturity: Part 8

    Compliance Management Continue reading on The CISO Den »

    Three critical but rarely discussed aspects of the security market

    I often discuss what makes security unique or different from other industries. Today’s article is another one in this series:…

    Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

    Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage The Iranian nation-state group known as MuddyWater has been attributed to a new…

    Hacked robots and power-hungry AI • Graham Cluley

    In episode 71 of The AI Fix, a giant robot spider goes backpacking for a year before starting its job…

    SOFTWARE

      Breaking Loose from Third-Party Lock-In with Custom Refactoring Tools

      Code refactoring is an essential part of the job of software developers. As time goes on, technology evolves, product requirements…

      Leveraging a Manager Weekly Newsletter for Team Communication

      I started my journey as an Engineering Manager at SoundCloud close to a year ago. This came after working as…

      Did I Break You? Reverse Dependency Verification

      SoundCloud was founded 13 years ago, and throughout its history, the company and much of its tech stack has changed.…

      How We Share Knowledge as a Web Collective

      There’s no single platform team that consists of only web engineers at SoundCloud, even though we consider ourselves to be…

      Service Architecture at SoundCloud — Part 1: Backends for Frontends

      This article is part of a series of posts aiming to cast some light onto how service architecture has evolved…

      Service Architecture at SoundCloud — Part 2: Value-Added Services

      This article is part of a series of posts aiming to cast some light onto how service architecture has evolved…

      Service Architecture at SoundCloud — Part 3: Domain Gateways

      This article is the last part in a series of posts aiming to cast some light onto how service architecture…

      Tiny Letter from Kafka | SoundCloud Backstage Blog

      This article discusses the powerful design choice of Apache Kafka, “an open-source distributed event streaming platform,” and gives a sneak…

      TECH

      Back to top button