Cybersecurity
Cybersecurity
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2.
"This browser-native,...
Hardware Releases
The New Framework Laptop 16 Has An Upgradable GPU!
A Big Change From The FrameWork Laptop 13
Ars Technica got their hands on the all new FrameWork Laptop...
Software Updates & Reviews
Fragments Nov 19
I’ve been on the road in Europe for the last couple of weeks, and while I was there...
Tech Trends & Innovations
Logitech Promo Code: $25 Off This Holiday Season
A leader in almost everything tech and home-office related for over 40 years, Swiss-founded Logitech offers a vast...
Gaming & Graphics
New Limited-Time Pokémon Scarlet And Violet Distribution Now Available
Although the new game Pokémon Legends: Z-A is now in full swing with its events and unlocks, The...
‘What happens online stays online’ and other cyberbullying myths, debunked
Separating truth from fiction is the first step towards making better parenting...
Weekly Update 465
How much tech stuff do I have sitting there in progress, literally just within arm's reach? I kick off this week's video going through...
Threat Intelligence Executive Report – Volume 2025, Number 4 – Sophos News
The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™...
DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
Aug 20, 2025Ravie LakshmananVulnerability / Browser Security
Popular password manager plugins for web browsers have been found susceptible to clickjacking security vulnerabilities that could be...
Gh0st RAT-based GodRAT attacks financial organizations
Summary
In September 2024, we detected malicious activity targeting financial (trading and brokerage) firms through the distribution of malicious .scr (screen saver) files disguised as...
Keeping an Eye on MFA-Bombing Attacks
I recently woke up (as one does each day, hopefully) and saw a few Microsoft MFA prompts had pinged me overnight. Since I had...

