Critical Vulnerabilities Discovered in Multiple Adobe Products Could Allow Arbitrary Code Execution

Multiple vulnerabilities have been identified in various Adobe products, with the most critical potentially allowing attackers to execute arbitrary code on affected systems. Adobe develops widely-used software for creating and publishing content across graphics, photography, illustration, animation, multimedia, film, and print. If successfully exploited, these vulnerabilities could enable attackers to execute code with the privileges … Continued

Malicious PyPI Package solana-token Targeted Solana Developers

ReversingLabs has identified a malicious open-source package on PyPI masquerading as a legitimate tool for Solana blockchain development. The package, named solana-token, appeared to be a utility for developers but was designed to exfiltrate source code from a developer’s machine upon installation. Although the package’s PyPI landing page lacked a description, its name and functions … Continued

Ivanti EPMM Zero-Day Flaws Expose Systems to Remote Attacks

Ivanti has issued critical security patches for its Endpoint Manager Mobile (EPMM) product to address two recently discovered vulnerabilities—CVE-2025-4427 and CVE-2025-4428—one rated medium and the other high in severity. When exploited together, these flaws could allow unauthenticated remote code execution on affected systems. Ivanti confirmed that a small number of customers have been impacted by … Continued

.NET-Based Malware PupkinStealer Targets Windows Users via Telegram

A newly identified threat dubbed PupkinStealer has emerged as of April 2025. Written in C# and  .NET framework, this information-stealing malware is designed to compromise Windows systems, focusing on harvesting sensitive user data and discreetly exfiltrating it using Telegram’s Bot API. Despite its relatively simple structure and lack of persistence mechanisms or advanced evasion techniques, … Continued

North Korean Hacking Group TA406 Targets Ukrainian Government in Intelligence-Gathering Campaign

A state-sponsored hacking group linked to North Korea, known as TA406, has launched a targeted cyber campaign against Ukrainian government entities, according to new findings by cybersecurity firm Proofpoint. The campaign, which began in February 2025, aims to collect sensitive political and military intelligence, potentially to inform North Korean decision-making around its support for Russia … Continued

Public Exploit Released for Patched macOS Vulnerability CVE-2025-31258

A security researcher has released a working proof-of-concept (PoC) exploit for a recently patched vulnerability in Apple’s macOS operating system, raising concerns about potential attacks on unpatched systems. The flaw, tracked as CVE-2025-31258, was addressed in Apple’s latest macOS Sequoia 15.5 update, rolled out on May 12. The vulnerability affects RemoteViewServices, a core macOS framework … Continued

Cybercriminals Lure Users with Fake AI Tools to Spread Noodlophile Malware

Cybersecurity researchers at Morphisec have uncovered a new wave of malicious campaigns exploiting the growing public interest in artificial intelligence (AI) to distribute a dangerous information-stealing malware known as Noodlophile. Unlike traditional phishing schemes or malware hidden in pirated software, threat actors are now creating elaborate, AI-themed platforms that impersonate legitimate services. These fake websites … Continued

ASUS Patches Critical Vulnerabilities in DriverHub Tool

ASUS has issued security updates to fix two high-severity vulnerabilities in its DriverHub utility, if exploited, could allow attackers to RCE on affected systems. The flaws, tracked as CVE-2025-3462 and CVE-2025-3463, were discovered by security researcher MrBruh and responsibly disclosed to ASUS on April 8, 2025. Patches were released on May 9. DriverHub is a … Continued

Supply Chain Attack Uncovered in Popular npm Package rand-user-agent

On May 5 at 16:00 GMT, cybersecurity firm Aikido’s automated malware analysis pipeline detected a serious supply chain compromise in the npm package rand-user-agent@1.0.110. The package, which averages approximately 45,000 weekly downloads, was found to contain malicious code designed to carry out remote access and data exfiltration. The rand-user-agent package, maintained by WebScrapingAPI, is widely … Continued

Chinese Threat Actor Exploits Critical SAP NetWeave Vulnerability(CVE-2025-31324)

A China-linked cyber threat actor, identified as Chaya_004, has been actively exploiting a critical vulnerability in SAP NetWeaver systems, according to new findings from cybersecurity firm Forescout Vedere Labs. The group is believed to be behind a growing wave of targeted attacks exploiting CVE-2025-31324, a recently disclosed security flaw that allows for remote code execution … Continued

Newsletter line