Fake Windows update blue screen used by the JackFix ClickFix attack to trick users into running malware from the Windows Run dialog

How the JackFix attack upgrades ClickFix social engineering

The JackFix attack marks the latest evolution of the ClickFix technique. By luring victims through fake adult sites into a full-screen Windows update screen, encoding Run-dialog commands, gating its payload URL, and dropping multiple infostealers through an obfuscated PowerShell script, JackFix sidesteps many earlier ClickFix mitigations and forces defenders to rethink how they handle browser-driven social engineering.

Read More
GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

GootLoader’s comeback: hidden filenames, ZIP-JS payloads

GootLoader reappeared with custom WOFF2 web-fonts that swap glyph shapes, so a gibberish string in source renders as a harmless-looking filename in the browser. Consequently, victims on SEO-poisoned WordPress sites download ZIP archives carrying JavaScript loaders that trigger rapid, hands-on compromises. Therefore, block risky downloads, hunt for loader execution, and harden WordPress and endpoints to cut dwell time and prevent domain-wide impact within hours.

Read More
FortiWeb web application firewall exploited via CVE-2025-64446 path traversal to gain administrative command execution using a public PoC tool

PoC Exploit Tool Targets FortiWeb CVE-2025-64446 Path Traversal

A public PoC exploit tool for CVE-2025-64446 now turns FortiWeb WAF appliances into high-value RCE targets. The bug uses a relative path traversal flaw to execute administrative commands over HTTP or HTTPS, and active exploitation in the wild, CISA KEV inclusion, and GitHub tooling mean security teams must urgently patch, lock down management access, and fold FortiWeb into their broader Fortinet and perimeter compromise playbooks.

Read More
Secret Service telecom takedown in New York - seized SIM servers and cards

Secret Service Dismantles Major Telecom Threat Targeting New York City

The U.S. Secret Service dismantled a massive telecom threat in New York City, seizing 100,000 SIM cards and 300 servers hidden across abandoned apartments. Authorities say the “imminent” campaign, discovered before the UN Assembly, could have crippled cellular services, government operations, and emergency systems. Investigators believe foreign threat actors used the network for covert communication with criminal enterprises

Read More