threat-intelligence

  1. Fake Windows 10 Upgrade Phishing Delivered CTB-Locker Ransomware

    Microsoft’s free Windows 10 upgrade became a vehicle for a crop of convincing phishing emails that delivered file‑encrypting ransomware disguised as a legitimate installer, according to security researchers — a reminder that major platform announcements instantly become social‑engineering boons...
  2. CVE-2025-54903: Excel Use-After-Free Local RCE — Patch Now

    Microsoft has published an advisory for CVE-2025-54903, a use‑after‑free vulnerability in Microsoft Excel that can lead to local code execution when a victim opens a specially crafted spreadsheet — a document‑based remote code execution (RCE) risk that should be treated as high priority for both...
  3. Chrome 140 Security Update: High-Severity V8 Use-After-Free CVE-2025-9864

    Chrome’s September security update closes a high-severity use-after-free vulnerability in the V8 JavaScript engine — tracked as CVE-2025-9864 — that could allow an attacker to corrupt memory and potentially achieve remote code execution through a crafted web page, and administrators of...
  4. Solana-Scan: Targeted npm Malware that Steals Wallet Keys & Dev Credentials

    Security researchers have uncovered a targeted supply‑chain campaign — dubbed “Solana‑Scan” — in which malicious npm packages masquerading as Solana SDK utilities are being used to harvest developer credentials, wallet keyfiles and other high‑value artifacts from developer machines. Background...