Home 2017-08-28T17:57:09+05:30

Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials

A new wave of phishing emails is circulating globally, posing as offers for a “Social Media Manager” role at Red Bull. These emails, crafted to look like personalized job invitations, [...]

By | July 15th, 2025|cyberattack, phishing|0 Comments

Google Gemini Workspace Vulnerability Allows Attackers to Conceal Malicious Scripts in Emails

Security researchers have identified a critical vulnerability in Google Gemini for Workspace that allows attackers to insert concealed malicious commands into emails. This flaw targets the AI assistant’s “Summarize this [...]

By | July 14th, 2025|Data Breach, Malware, phishing, vulnerability|0 Comments

Microsoft Remote Desktop Client Vulnerability Allowed Attackers to Execute Remote Code

A critical security flaw in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could enable attackers to execute arbitrary code on targeted systems. This vulnerability impacts various Windows versions and presents [...]

By | July 9th, 2025|Secuirty Update, vulnerability|0 Comments

WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control

A new wave of cyberattacks is actively compromising WordPress websites through the use of malicious SEO plugins capable of enabling full site takeovers. Security researchers have identified advanced malware campaigns [...]

By | July 6th, 2025|cyberattack, Malware, phishing, Website Security, wordpress|0 Comments

Linux at Risk: Critical Sudo Vulnerabilities Enable Root Access for Local Attackers

Cybersecurity researchers have uncovered two security vulnerabilities in the Sudo command-line utility used in Linux and Unix-like systems, which could allow local attackers to gain root-level access on affected machines. [...]

By | July 5th, 2025|Data Breach, Secuirty Update, vulnerability|0 Comments

Subscribe to our newsletter to receive security tips everday!