Misconfigurations in cloud services are being increasingly exploited by threat actors to distribute malicious payloads, according to Hackread. A study found that Amazon Web Services has been used to deploy trojans, while malware operators have also abused cloud providers for command-and-communications. The findings show the need for organizations to rethink cloud security strategies.

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
A security assessment by Shelltrail revealed three critical vulnerabilities in the IXON VPN client, allowing privilege escalation on Windows and Linux. Identified as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02,