Cybersecurity
Cybersecurity
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2.
"This browser-native,...
Hardware Releases
The New Framework Laptop 16 Has An Upgradable GPU!
A Big Change From The FrameWork Laptop 13
Ars Technica got their hands on the all new FrameWork Laptop...
Software Updates & Reviews
Fragments Nov 19
I’ve been on the road in Europe for the last couple of weeks, and while I was there...
Tech Trends & Innovations
Logitech Promo Code: $25 Off This Holiday Season
A leader in almost everything tech and home-office related for over 40 years, Swiss-founded Logitech offers a vast...
Gaming & Graphics
New Limited-Time Pokémon Scarlet And Violet Distribution Now Available
Although the new game Pokémon Legends: Z-A is now in full swing with its events and unlocks, The...
Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
Cybersecurity researchers are warning of a "widespread and ongoing" SMS phishing campaign that's been targeting toll road users in the United States for financial...
Most frequently encountered malware and abused software – Sophos News
This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...
Detection engineering: why it is important and how to implement it in your SOC
Security operations centers (SOCs) exist to protect organizations from cyberthreats by detecting and responding to attacks in real time. They play a crucial role...
Online Services Again Abused to Exfiltrate Data
If Attackers can abuse free online services, they will do for sure! Why spend time to deploy a C2 infrastructure if you have plenty...
China-based SMS Phishing Triad Pivots to Banks – Krebs on Security
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently,...
Ransomware Reaches A Record High, But Payouts Are Dwindling
Shed a tear, if you can, for the poor, misunderstood cybercriminals hard at work trying to earn a dishonest crust by infecting organisations with...

