Cybersecurity
Cybersecurity
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2.
"This browser-native,...
Hardware Releases
The New Framework Laptop 16 Has An Upgradable GPU!
A Big Change From The FrameWork Laptop 13
Ars Technica got their hands on the all new FrameWork Laptop...
Software Updates & Reviews
Fragments Nov 19
I’ve been on the road in Europe for the last couple of weeks, and while I was there...
Tech Trends & Innovations
Logitech Promo Code: $25 Off This Holiday Season
A leader in almost everything tech and home-office related for over 40 years, Swiss-founded Logitech offers a vast...
Gaming & Graphics
New Limited-Time Pokémon Scarlet And Violet Distribution Now Available
Although the new game Pokémon Legends: Z-A is now in full swing with its events and unlocks, The...
Troy Hunt: Weekly Update 471
I'm so happy to finally be getting those HIBP demos out! The...
HeartCrypt’s wholesale impersonation effort – Sophos News
Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes:
Malware impersonating, subverting, and...
Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam
Sep 26, 2025Ravie LakshmananMalware / Cryptocurrency
A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then...
What happens when a cybersecurity company gets phished? – Sophos News
If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a...
Kaspersky industrial threat report for Q2 2025
Statistics across all threats
In Q2 2025, the percentage of ICS computers on which malicious objects were blocked decreased by 1.4 pp from the previous...
[Guest Diary] Distracting the Analyst for Fun and Profit
.]
Distributed denial of service (DDoS) attacks are a type of cyber-attack where the threat actor attempts to disrupt a service by flooding the target...

