Octalyn Stealer Collects VPN Configs, Passwords, and Cookies into Organized Folder Structures
A sophisticated new credential stealer has surfaced on GitHub, masquerading as a legitimate forensic toolkit while targeting sensitive user data such as VPN configurations, browser credentials, and cryptocurrency wallet information. [...]
Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials
A new wave of phishing emails is circulating globally, posing as offers for a “Social Media Manager” role at Red Bull. These emails, crafted to look like personalized job invitations, [...]
Google Gemini Workspace Vulnerability Allows Attackers to Conceal Malicious Scripts in Emails
Security researchers have identified a critical vulnerability in Google Gemini for Workspace that allows attackers to insert concealed malicious commands into emails. This flaw targets the AI assistant’s “Summarize this [...]
Microsoft Remote Desktop Client Vulnerability Allowed Attackers to Execute Remote Code
A critical security flaw in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could enable attackers to execute arbitrary code on targeted systems. This vulnerability impacts various Windows versions and presents [...]
WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control
A new wave of cyberattacks is actively compromising WordPress websites through the use of malicious SEO plugins capable of enabling full site takeovers. Security researchers have identified advanced malware campaigns [...]





Get Social