CoinDCX Hack: $44.2 Million Drained from the Platform
On July 19, 2025, CoinDCX, India's second-largest cryptocurrency exchange, confirmed a sophisticated security breach that led to the theft of approximately $44.2 million from its platform. This major cyberattack adds [...]
CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks
On July 17, 2025, CISA released three important advisories concerning Industrial Control Systems (ICS), targeting critical vulnerabilities in energy monitoring, healthcare imaging, and access control technologies. The advisories warn of [...]
Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation
Google’s cutting-edge AI-driven security tool, Big Sleep, has reached a major milestone by identifying and halting the exploitation of a critical SQLite 0-day vulnerability, making it the first instance where [...]
Octalyn Stealer Collects VPN Configs, Passwords, and Cookies into Organized Folder Structures
A sophisticated new credential stealer has surfaced on GitHub, masquerading as a legitimate forensic toolkit while targeting sensitive user data such as VPN configurations, browser credentials, and cryptocurrency wallet information. [...]
Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials
A new wave of phishing emails is circulating globally, posing as offers for a “Social Media Manager” role at Red Bull. These emails, crafted to look like personalized job invitations, [...]
Get Social