A malware analysis revealed that attackers increasingly exploit the Application Layer of the OSI model for stealthy Command-and-Control operations. By abusing protocols like HTTP, DNS, and SMTP, they embed malicious activities within legitimate traffic, evading detection. This highlights the need for advanced detection mechanisms, such as deep packet inspection and behavioral monitoring, to combat sophisticated cyber threats.

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
A security assessment by Shelltrail revealed three critical vulnerabilities in the IXON VPN client, allowing privilege escalation on Windows and Linux. Identified as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02,