Cybersecurity
Cybersecurity
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2.
"This browser-native,...
Hardware Releases
The New Framework Laptop 16 Has An Upgradable GPU!
A Big Change From The FrameWork Laptop 13
Ars Technica got their hands on the all new FrameWork Laptop...
Software Updates & Reviews
Fragments Nov 19
I’ve been on the road in Europe for the last couple of weeks, and while I was there...
Tech Trends & Innovations
Logitech Promo Code: $25 Off This Holiday Season
A leader in almost everything tech and home-office related for over 40 years, Swiss-founded Logitech offers a vast...
Gaming & Graphics
New Limited-Time Pokémon Scarlet And Violet Distribution Now Available
Although the new game Pokémon Legends: Z-A is now in full swing with its events and unlocks, The...
Targeted attacks leverage accounts on popular online platforms as C2 servers
Introduction
In the latter half of 2024, the Russian IT industry, alongside a number of entities in other countries, experienced a notable cyberattack. The attackers...
Triage is Key! Python to the Rescue!
When you need to quickly analyze a lot of data, there is one critical step to perform: Triage. In forensic investigations, this step is...
Phishers Target Aviation Execs to Scam Customers – Krebs on Security
KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending...
Free decryptor for victims of Phobos ransomware released
There is good news for any organisation which has been hit by the Phobos ransomware. Japanese police have released a free decryptor capable of recovering...
Revenge Bytes – Darknet Diaries
Full Transcript
Madison’s nude photos were posted online. Her twin sister Christine came to help. This begins a bizarre and uneasy...
An all-you-can-eat buffet for threat actors
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day...

