
Part

ESET takes part in global operation to disrupt Lumma Stealer
ESET has collaborated with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry in a global disruption operation against Lumma Stealer, an infamous malware-as-a-service (MaaS) infostealer. The operation targeted Lumma Stealer infrastructure with all known C&C servers in the past year, rendering the exfiltration network, or a large part of it, nonoperational. Key points of this…

Better CSS Shapes Using shape() — Part 3: Curves | CSS-Tricks
If you’re following along, this is the third post in a series about the new CSS shape() function. We’ve learned how to draw lines and arcs and, in this third part, I will introduce the curve command — the missing command you need to know to have full control over the shape() function. In reality,…

Power amplifiers that oscillate—deliberately. Part 1: A simple start.
Editor’s Note: This DI is a two-part series. In Part 1, Nick Cornford deliberately oscillates the TDA7052A audio power amplifier to produce a siren-like sound and, given the device’s distortion characteristics, a functional Wien bridge oscillator. In Part 2, Cornford minimizes this distortion and adds amplitude control to the circuit. When audio power amplifiers oscillate,…

Designing power supplies for industrial functional safety, Part 1
A power supply unit is one of the most crucial components in an electronics system, as its operation can affect the entire system’s functionality. In the context of industrial functional safety, as in IEC 61508, power supplies are considered elements and supporting services to electrical/electronic/programmable electronic (E/E/PE) safety-related systems (SRS) as well as other subsystems….

Beyond the kill chain: What cybercriminals do with their money (Part 5)
Content warning: Because of the nature of some of the activities we discovered, this series of articles contains content that some readers may find upsetting. This includes profanity and references to drugs, drug addiction, gambling, pornography, violence, arson, and sex work. These references are textual only and do not include images or videos. Having explored…

Better CSS Shapes Using shape() — Part 1: Lines and Arcs | CSS-Tricks
Creating CSS Shapes is a classic and one of my favorite exercise. Indeed, I have one of the biggest collections of CSS Shapes from where you can easily copy the code of any shape. I also wrote an extensive guide on how to create them: The Modern Guide For Making CSS Shapes. Even if I…

Smashing Animations Part 3: SMIL’s Not Dead Baby, SMIL’s Not Dead — Smashing Magazine
While there are plenty of ways that CSS animations can bring designs to life, adding simple SMIL (Synchronized Multimedia Integration Language) animations in SVG can help them do much more. Andy Clarke explains where SMIL animations in SVG take over where CSS leaves off. The SMIL specification was introduced by the W3C in 1998 for…

Revealing the infrasonic underworld cheaply, Part 2
In Part 1 of this Design Idea (DI), we saw how a standard electret microphone capsule can be persuaded to detect infrasonic signals down to a fraction of a Hertz by adding some fairly simple equalization. In this second and concluding part, we will improve that circuitry and also add an audio output to allow…

Revealing the infrasonic underworld cheaply, Part 1
Editor’s Note: Part 1 of this DI uses an electret mic to create infrasound. It starts with a basic equalization circuit validated with a DIY test fixture and simulations, and ends with a deeper analysis of the circuit’s real response. Part 2 includes refinements to make the circuit more usable while extending its detectable spectrum…