Security Flaws in Eaton Products May Allow Code Execution
Eaton has released a security advisory after identifying multiple vulnerabilities in its UPS Companion (EUC) software. If exploited, these issues could allow attackers to run malicious code on the affected [...]
Phishing Campaign Exploits Google Tasks Feature
In December 2025, a phishing campaign hit over 3,000 organizations, mostly in manufacturing. The attackers used Google’s own systems to send the emails, which helped them get past company email [...]
Apache NuttX Bug Allows Remote System Crashes
A newly disclosed vulnerability in Apache NuttX RTOS could allow attackers to crash systems or trigger unexpected file operations. The issue affects devices running network-exposed services and has prompted security [...]
ErrTraffic Tool Automates ClickFix Cyber Attacks
Cybercrime activity is increasingly shaped by automation and repeatable services. Researchers at Hudson Rock have identified ErrTraffic v2, a platform designed to operationalize ClickFix attacks at scale by packaging social-engineering [...]
GlassWorm malware uses malicious VS Code extensions to attack macOS systems
GlassWorm has returned with a dangerous new evolution, shifting its focus entirely to macOS. First discovered in October, the malware originally spread through malicious VS Code extensions that used invisible [...]





Get Social