Hackers Using New Matrix Push C2 to Deliver Malware & Phishing Attacks via Web Browser

Hackers are turning everyday web browsers into remote-control tools using a new command-and-control (C2) platform called Matrix Push C2, according to BlackFog research. The browser‑native, fileless framework abuses legitimate web push notification features to deliver malware, phishing pages, and data theft campaigns across Windows, macOS, Linux, and mobile platforms. Instead of dropping traditional malware binaries…

Read More

Phishing Trends Report, 2025, from Hoxhunt Data

The 2025 Phishing Trends Report provides the first reference point for the global incidence of real malicious clicks and the phishing attacks that bypass email filters. This information fills a critical gap in the cybersecurity literature. As phishing continuously reaches new levels, effective phishing protections and cyber security training models must do the same. The good…

Read More

Bitdefender Launches Data Lake Security Tools

Bitdefender has unveiled a new product for collecting and analysing cybersecurity data, launching its GravityZone Security Data Lake and companion Data Lake for Managed Detection and Response (MDR) solutions. The tools are designed to unify security telemetry across multiple sources — from endpoints and networks to cloud environments — to help organisations detect threats faster and reduce…

Read More

Sophisticated cybercriminals deploying AI as a weapon ; Report

Sophisticated cybercriminals deploying artificial intelligence (AI) as a weapon  .. Sophisticated cybercriminals deploying artificial intelligence (AI) as a weapon are taking advantage of inadequate corporate defences in India, CrowdStrike’s latest Asia Pacific eCrime report found. This raises alarm bells for the country’s $5 trillion economic ambitions. Though the Asia Pacific region represents more than half of…

Read More

CISA & NSA share tips on securing Microsoft Exchange servers

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released guidance to help IT administrators harden Microsoft Exchange servers on their networks against attacks. They recommended best practices This include hardening user authentication and access, minimizing application attack surfaces, ensuring strong network encryption. The agencies also advise network defenders to…

Read More

Cybersecurity & energy leaders join forces to protect EU power grids

Europe’s top energy, cybersecurity, and technology leaders joined forces in Brussels for the 8th Cybersecurity Forum on Thursday to discuss ways to strengthen resilience and prevent attacks against Europe’s interconnected power grid.   “As geopolitical tensions grow and the digitalization of the energy sector advances, strengthening the cybersecurity of Europe’s energy infrastructure is more important than ever,”…

Read More

India Tops Global Malware Infection Chart, 8th in Cyber Threat Exposure Report

India has emerged as the most affected country by a prolific malware strain while ranking eighth globally in overall cyber threat exposure, according to Microsoft‘s Digital Defense Report 2025 released recently. And the top target for Lumma Stealer malware, with over 44,000 infected Windows devices between March and May 2025, according to Microsoft’s Digital Defense Report….

Read More

Cybercriminal Forum BreachForums Is Back Again With New Tactics

The infamous cybercrime discussion board BreachForums has resurfaced on-line, this time on a clearnet area accessible with out specialized instruments like Tor. The platform, lengthy a hub for knowledge leaks, hacking instruments, and illicit trades, went darkish earlier this 12 months following a collection of legislation enforcement takedowns and inner disruptions. Now, simply months later,…

Read More