HP Wolf Security researchers reported that threat actors are using fake CAPTCHA challenges to infect victims’ devices with malware, as detailed in the latest HP Threat Insights Report. The report disclosed various hacking campaigns that trick users into engaging in fake CAPTCHA challenges that lead to harmful websites. Here, users are manipulated into triggering malicious PowerShell scripts, often without realizing, thus installing a remote access trojan that allows hackers to steal crucial information.

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
A security assessment by Shelltrail revealed three critical vulnerabilities in the IXON VPN client, allowing privilege escalation on Windows and Linux. Identified as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02,