Cybersecurity
Cybersecurity
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2.
"This browser-native,...
Hardware Releases
The New Framework Laptop 16 Has An Upgradable GPU!
A Big Change From The FrameWork Laptop 13
Ars Technica got their hands on the all new FrameWork Laptop...
Software Updates & Reviews
Fragments Nov 19
I’ve been on the road in Europe for the last couple of weeks, and while I was there...
Tech Trends & Innovations
Logitech Promo Code: $25 Off This Holiday Season
A leader in almost everything tech and home-office related for over 40 years, Swiss-founded Logitech offers a vast...
Gaming & Graphics
New Limited-Time Pokémon Scarlet And Violet Distribution Now Available
Although the new game Pokémon Legends: Z-A is now in full swing with its events and unlocks, The...
Honeypot: Requests for (Code) Repositories
This is just a quick diary entry to report that I saw requests on my honeypot for (code) repositories:
/.git/logs/refs/remotes/origin/main
/.git/objects/info
/.github
/.github/dependabot.yml
/.github/funding.yml
/.github/ISSUE_TEMPLATE
/.gitlab/issue_templates
/.gitlab-ci
/.git-secret
/.svnignore
/aws/bucket
/s3/backup
/s3/bucket
/s3/credentials
So watch out what you publish...
Cloudflare Scrubs Aisuru Botnet from Top Domains List – Krebs on Security
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of...
Hackers target massage parlour clients in blackmail scheme
South Korean police have uncovered a hacking operation that stole sensitive data from massage parlours and blackmailed their male clientele.According to local media reports,...
Tanya – Darknet Diaries
Full Transcript
Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode,...
How social engineering really works
Think you could never fall for an online scam? Think again. Here's...
Weekly Update 476
The 2 billion email address stealer log breach I talk about this week is almost ready to go at the time of writing. It's...

