Cybersecurity
Cybersecurity
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2.
"This browser-native,...
Hardware Releases
The New Framework Laptop 16 Has An Upgradable GPU!
A Big Change From The FrameWork Laptop 13
Ars Technica got their hands on the all new FrameWork Laptop...
Software Updates & Reviews
Fragments Nov 19
I’ve been on the road in Europe for the last couple of weeks, and while I was there...
Tech Trends & Innovations
Logitech Promo Code: $25 Off This Holiday Season
A leader in almost everything tech and home-office related for over 40 years, Swiss-founded Logitech offers a vast...
Gaming & Graphics
New Limited-Time Pokémon Scarlet And Violet Distribution Now Available
Although the new game Pokémon Legends: Z-A is now in full swing with its events and unlocks, The...
Outlaw botnet detected in an incident contained by Kaspersky
Introduction
In a recent incident response case in Brazil, we dealt with a relatively simple, yet very effective threat focused on Linux environments. Outlaw (also...
“Mirai” Now Exploits Samsung MaginINFO CMS (CVE-2024-7399)
Last August, Samsung patched an arbitrary file upload vulnerability that could lead to remote code execution . The announcement was very sparse and did...
xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs – Krebs on Security
An employee at Elon Musk’s artificial intelligence company xAI leaked a private key on GitHub that for the past two months could have allowed anyone...
Hacking hijinks at the hospital, and WASPI scams • Graham Cluley
He’s not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of...
ANOM – Darknet Diaries
Full Transcript
In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of ANOM. A secure phone made by criminals, for...
This month in security with Tony Anscombe – April 2025 edition
From the near-demise of MITRE's CVE program to a report showing that...

