Hackers are hiding malware in images hosted on reputable websites to compromise computers and steal sensitive data like passwords and cryptocurrency wallet information. Researchers from HP Wolf Security found large campaigns spreading VIP Keylogger and 0bj3ctivityStealer, and using phishing kits and AI tools to trick users. The malware is often concealed in Excel files attached to phishing emails pretending to be invoices or purchase orders.

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
A security assessment by Shelltrail revealed three critical vulnerabilities in the IXON VPN client, allowing privilege escalation on Windows and Linux. Identified as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02,