A severe vulnerability in Acer Control Center software allows attackers to execute arbitrary code with system-level privileges due to misconfigured Windows Named Pipe permissions. Reported by Leon Jacobs, it was addressed in an update released on May 15, 2025. Organizations using the software should update immediately to mitigate the risk of exploitation.

Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
The cryptocurrency and blockchain ecosystem faces a surge in sophisticated malware targeting open-source supply chains, with 75% of malicious packages found on npm. Attackers exploit