Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials
A new wave of phishing emails is circulating globally, posing as offers for a “Social Media Manager” role at Red Bull. These emails, crafted to look like personalized job invitations, [...]
Google Gemini Workspace Vulnerability Allows Attackers to Conceal Malicious Scripts in Emails
Security researchers have identified a critical vulnerability in Google Gemini for Workspace that allows attackers to insert concealed malicious commands into emails. This flaw targets the AI assistant’s “Summarize this [...]
Microsoft Remote Desktop Client Vulnerability Allowed Attackers to Execute Remote Code
A critical security flaw in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could enable attackers to execute arbitrary code on targeted systems. This vulnerability impacts various Windows versions and presents [...]
WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control
A new wave of cyberattacks is actively compromising WordPress websites through the use of malicious SEO plugins capable of enabling full site takeovers. Security researchers have identified advanced malware campaigns [...]
Linux at Risk: Critical Sudo Vulnerabilities Enable Root Access for Local Attackers
Cybersecurity researchers have uncovered two security vulnerabilities in the Sudo command-line utility used in Linux and Unix-like systems, which could allow local attackers to gain root-level access on affected machines. [...]





Get Social