Home 2017-08-28T17:57:09+05:30

CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks

On July 17, 2025, CISA released three important advisories concerning Industrial Control Systems (ICS), targeting critical vulnerabilities in energy monitoring, healthcare imaging, and access control technologies. The advisories warn of [...]

By | July 18th, 2025|CISA, vulnerability|0 Comments

Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation

Google’s cutting-edge AI-driven security tool, Big Sleep, has reached a major milestone by identifying and halting the exploitation of a critical SQLite 0-day vulnerability, making it the first instance where [...]

By | July 17th, 2025|vulnerability, Zero Day Attack|0 Comments

Octalyn Stealer Collects VPN Configs, Passwords, and Cookies into Organized Folder Structures

A sophisticated new credential stealer has surfaced on GitHub, masquerading as a legitimate forensic toolkit while targeting sensitive user data such as VPN configurations, browser credentials, and cryptocurrency wallet information. [...]

By | July 16th, 2025|Malware, vulnerability|0 Comments

Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials

A new wave of phishing emails is circulating globally, posing as offers for a “Social Media Manager” role at Red Bull. These emails, crafted to look like personalized job invitations, [...]

By | July 15th, 2025|cyberattack, phishing|0 Comments

Subscribe to our newsletter to receive security tips everday!