Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

22/11/2025 0 Comments 0 tags

Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. “This browser-native,

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

21/11/2025 0 Comments 0 tags

Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations. The vulnerability, tracked as CVE-2025-41115, carries a

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

21/11/2025 0 Comments 0 tags

In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains

21/11/2025 0 Comments 0 tags

A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent remote access to compromised networks as part of a nearly

Why IT Admins Choose Samsung for Mobile Security

21/11/2025 0 Comments 0 tags

Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for modern work—but with mobility comes risk. IT

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

21/11/2025 0 Comments 0 tags

The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

21/11/2025 0 Comments 0 tags

Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected to the platform. “Our investigation indicates this activity may have enabled unauthorized access to certain customers’ Salesforce data

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

20/11/2025 0 Comments 0 tags

Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

20/11/2025 0 Comments 0 tags

Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

20/11/2025 0 Comments 0 tags

This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves