CISA Releases Two Industrial Control Systems Advisories

CISA released two Industrial Control Systems (ICS) Advisories. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.  ICSA-25-364-01: WHILL C2 Wheelchairs ICSA-25-345-03: AzeoTech DAQFactory (Update A)  CISA encourages users and administrators to review newly released…

New Spear-Phishing Attack Targeting Security Individuals in the Israel Region

Israel’s National Cyber Directorate has issued an urgent alert warning of an active spear-phishing campaign specifically targeting individuals employed in security and defense-related sectors. The operation, linked to infrastructure associated with APT42 (also known as Charming Kitten), represents a deliberate…

Hackers Promote “VOID” AV Killer Claiming Kernel-Level Defense Evasion

A threat actor operating under the handle Crypt4You has begun advertising a sophisticated new offensive tool on underground cybercrime forums, marketed as a “kernel-level” security neutralization utility. Dubbed VOID KILLER, the malware is designed explicitly to terminate antivirus (AV) and Endpoint Detection and…

Interview QnA: Blockchain for Cybersecurity

A structured QnA guide explaining blockchain fundamentals, security features, smart contracts, risks, and real-world cybersecurity applications for interviews. This article has been indexed from CyberMaterial Read the original article: Interview QnA: Blockchain for Cybersecurity

Cyber Briefing: 2025.12.30

AI investment scams surge as Mac malware bypasses Gatekeeper, critical software flaws emerge, ransomware hits universities, and massive breaches expose millions. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2025.12.30