Google Gemini Workspace Vulnerability Allows Attackers to Conceal Malicious Scripts in Emails
Security researchers have identified a critical vulnerability in Google Gemini for Workspace that allows attackers to insert concealed malicious commands into emails. This flaw targets the AI assistant’s “Summarize this [...]
Microsoft Remote Desktop Client Vulnerability Allowed Attackers to Execute Remote Code
A critical security flaw in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could enable attackers to execute arbitrary code on targeted systems. This vulnerability impacts various Windows versions and presents [...]
WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control
A new wave of cyberattacks is actively compromising WordPress websites through the use of malicious SEO plugins capable of enabling full site takeovers. Security researchers have identified advanced malware campaigns [...]
Linux at Risk: Critical Sudo Vulnerabilities Enable Root Access for Local Attackers
Cybersecurity researchers have uncovered two security vulnerabilities in the Sudo command-line utility used in Linux and Unix-like systems, which could allow local attackers to gain root-level access on affected machines. [...]
CrowdStrike Services has observed SCATTERED SPIDER escalating its attacks across multiple industries
CrowdStrike Services outlines the techniques used by SCATTERED SPIDER in attacks targeting the aviation, insurance, and retail sectors, and provides guidance to help organizations defend against this threat. SCATTERED SPIDER, [...]
Get Social