❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

The first new Marathon game in decades will launch on March 5

19 January 2026 at 16:07

It has been nearly three years now since Destiny maker (and Sony subsidiary) Bungie formally announced a revival of the storied Marathon FPS franchise. And it has been about seven months since the game's originally announced release date of September 23, 2025, was pushed back indefinitely after a reportedly poor response to the game's first Alpha test.

But today, in a post on the PlayStation Blog, Bungie revealed that the new Marathon would finally be hitting PS5, Windows, and Xbox Series X|S on March 5, narrowing down the monthlong March release window announced back in December.

Today's preorder trailer revealing the Marathon release date.

Unlike Destiny 2, which transitioned to a free-to-play model in 2019, the new Marathon sells a Standard Edition for $40 or a $60 Deluxe Edition that includes some digital rewards and cosmetics. That mirrors the pricing of the somewhat similar Arc Raiders, which recently hit 12 million sales in less than 12 weeks.

Read full article

Comments

Β© Bungie

Repairing a Self-Destructing SRS DG535 Digital Delay Generator

7 January 2026 at 04:00

There’s a lot of laboratory equipment out there that the casual hobbyist will never need to use, but that doesn’t mean you wouldn’t snap it up if the price is right. That’s what happened when [Tom Verbeure] saw a 1980s digital delay generator at a flea market for $40. Not only is it an excellent way to learn something about these devices, but it also provides a fascinating opportunity to troubleshoot and hopefully fix it. Such was also the case with this Stanford Research Systems (SRS) DG535 that turned out to be not only broken, but even features an apparently previously triggered self-destruct feature.

These devices are pretty basic, with this specimen incorporating a Z80 MPU in addition to digital and analog components to provide a programmable delay with 12.5 nanosecond resolution on its output channels after the input trigger is sensed. For that reason it was little surprise that the problem with the device was with its supply rails, of which a few were dead or out of spec, along with a burned-out trace.

Where the self-destruct feature comes into play is with the use of current boosting resistors around its linear regulators. Although these provide a current boost over what the regulator can provide, their disadvantages include a tendency towards destruction whenever the load on the supply rail decreases. This could for example occur when you’re debugging an issue and leave some of the PCBs disconnected.

Unsurprisingly, this issue caused the same charred trace to reignite during [Tom]’s first repair attempt, but after working up the courage over the subsequent 18 months the second repair attempt went much better, also helped by the presence of the mostly correct original board schematics.

Ultimately the fixes were relatively modest, involving replacing a discrete diode bridge with an integrated one, fixing the -9 V rail with a bodge wire, and replacing the LCD with its busted AC-powered backlight with a modern one with a LED backlight. Fortunately running the 5 V rail at 7 V for a while seemed to have caused no readily observable damage, nor did flipping connectors because of SRS’ inconsistent β€˜standards’ for its connector orientations.

Sadly, when [Tom] emailed SRS to inquire about obtaining an updated schematic for this unit β€” which is currently still being sold new for $4,495 β€” he merely got told to send his unit in for repair.

10 Ways Cybersecurity Teams Can Stay Ahead of Emerging Threats

5 August 2025 at 06:41
5/5 - (1 vote)

Last Updated on September 4, 2025 by Narendra Sahoo

Cybersecurity threats are always changing. Hackers are constantly finding new ways to break into systems. As technology grows, so do the risks. A single weak spot can lead to serious damage. To stay safe, security teams must stay ahead, not just keep up.

The following strategies offer practical ways to build a strong cybersecurity strategy and prepare for what lies ahead.

1. Keep Up With Threat Intelligence

New threats usually show early signs before they spread widely. By following trusted security blogs, reports, and alert systems, teams can receive important updates in real time. These sources often highlight current attack scenarios, such as newly discovered malware or social engineering techniques.

To enhance visibility, security teams should consider using OSINT Softwareβ€”Open Source Intelligence tools that gather public data from forums, social media, and the dark web to uncover potential threats early. These tools allow analysts to spot attacker chatter, leaked credentials, and indicators of compromise before an incident escalates.

2. Run Regular Security Training

Most attackers target people, not just systems. One careless click on a phishing email can cause serious trouble. That’s why employee awareness is a critical part of any cybersecurity strategy.

Teams should run regular sessions to teach staff about phishing attacks, social engineering, and basic security measures. Simulated exercises and attack scenarios make the learning experience more engaging. With the right training, employees become a strong part of the company’s cyber defense.

3. Use Automation and AI Tools

Manually spotting every threat is nearly impossible today. Cyberattacks move too fast, and data volumes are too large. Automation tools can help speed up threat detection and improve response times. AI-driven systems can detect unusual behaviors and alert teams quickly.

For instance, security systems with machine learning can identify patterns that signal a possible breach. When paired with automated intrusion detection systems and endpoint monitoring, these tools reduce the time it takes to spot and stop a threat. This proactive approach supports strong risk management.

4. Apply Patches Without Delay

Many cyberattacks succeed because of old software flaws. If a system hasn’t been updated, hackers may already know how to break in. Delays in applying patches can lead to severe data breaches.

To fix this, organizations should patch software as soon as updates are released. In addition to regular updates, ethical hackers can perform penetration testing to find weaknesses before attackers do. These penetration tests often reveal overlooked vulnerabilities that need to be addressed right away.

5. Do Continuous Risk Assessments

Cyber risks change over time. New applications, third-party services, and user behaviors all influence a company’s risk profile. This is why ongoing risk management is necessary.

Security teams should conduct regular vulnerability scans and penetration testing to understand where systems are most at risk. Assessments should also review whether security measures like data encryption, access controls, and intrusion detection are working as intended. By continuously improving their defenses, teams reduce the chances of falling victim to future threats.

6. Adopt a Zero Trust Approach

The old way of trusting everything inside the network no longer works. If a hacker gets inside, unrestricted access gives them free rein. Zero Trust security policies help prevent this.

In a Zero Trust model, all access requests are verified. Multi-factor authentication, limited access permissions, and strict monitoring help reduce the impact of a breach. This layered approach, supported by strong information security practices, limits how far attackers can go.

7. Work With Outside Partners

Cybersecurity teams don’t have to work alone. External partnerships provide valuable insight and access to tools and services that strengthen internal operations.

Joining industry groups or information-sharing networks allows teams to learn from others facing similar threats. Collaboration also gives access to ethical hackers and specialized services that run advanced penetration tests and threat simulations. Working with outside experts helps teams stay sharp and prepare for emerging threats.

8. Test Incident Response Plans Often

Even the best defenses can fail. What happens next depends on preparation. Having a written plan is a good start, but regular testing makes it effective.

Teams should run tabletop exercises that simulate real-world attack scenarios like data breaches or ransomware outbreaks. These tests help evaluate how quickly systems detect intrusions, whether staff follow security policies, and how well the response limits damage. A well-tested plan boosts confidence and resilience when a real incident occurs.

9. Secure Cloud Systems Properly

As more companies move to cloud services, new risks appear. Misconfigured settings, weak identity controls, and unclear responsibilities can open doors to attackers.

Cloud environments should follow strict information security guidelines. Teams need to understand the shared responsibility model and ensure their cloud systems use strong data encryption, secure access controls, and routine monitoring. Cloud security posture management (CSPM) tools help check for gaps and ensure policies are followed correctly.

10. Track Key Security Metrics

Tracking the right metrics helps cybersecurity teams measure their progress. This includes time to detect threats, time to respond, number of successful phishing tests, and percentage of systems that passed recent penetration tests.

cyber threats

These metrics highlight how well security measures are working and where improvements are needed. They also show leadership that the cybersecurity strategy is active and effective. Clear, focused metrics support long-term threat monitoring and defense planning.

Conclusion

Cyber threats are not slowing down, but strong planning and the right tools make a big difference. A complete cybersecurity strategy includes regular training, threat intelligence, strong security systems, and partnerships with trusted experts.

By applying patches quickly, running penetration testing, improving response plans, and securing cloud environments, teams reduce risk and increase control. Every measure strengthens a company’s cyber defense. Staying prepared now helps avoid major problems later.

The post 10 Ways Cybersecurity Teams Can Stay Ahead of Emerging Threats appeared first on Information Security Consulting Company - VISTA InfoSec.

❌
❌