Researchers have uncovered a sophisticated attack leveraging Component Object Model (COM) objects for fileless malware execution and lateral movement within networks. This technique manipulates legitimate Windows functionality, evading security measures, and allows for privileged code execution within protected processes. It highlights the need for monitoring registry manipulations and CLR load events to combat this evolving threat.

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
A security assessment by Shelltrail revealed three critical vulnerabilities in the IXON VPN client, allowing privilege escalation on Windows and Linux. Identified as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02,