Many crypto projects have the principle of allowing individuals to gain control over their data. Corporations like Google and Facebook, which collect vast volumes of data on individuals and then commercialize that data for a large profit, are frequently presented as examples of how…
Source: blockchainhealthcarereview.com – Read more

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
A security assessment by Shelltrail revealed three critical vulnerabilities in the IXON VPN client, allowing privilege escalation on Windows and Linux. Identified as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02,