Google Product Security Update Advisory
Overview We have released security updates to fix vulnerabilities in Google products. Users of affected products are advised to update to the latest version. Affected Products CVE-2025-6558, CVE-2025-7656, CVE-2025-7657 Chrome (Linux) Version: 138.0.7204.157 and earlierChrome (Windows, Mac) version: below 138.0.7204.157/.158 Resolved Vulnerabilities Improper
July 21, 2025
July 21, 2025 Hash 1ff83fd5658b6f9d9a14e5bbb9b5bd267 2f90e2c905462cb958f06af9bfbf1ad26 379fe9dce2b13db1d5b8e62f1c1083a2c URL 1http[:]//www[.]aegtecnoservice[.]it/ 2http[:]//176[.]46[.]157[.]60/d8tr4u9k/index[.]php 3https[:]//fasrdj863[.]weebly[.]com/ IP 1115[.]190[.]93[.]31 243[.]225[.]158[.]4 3154[.]210[.]129[.]174...
Mobile Security & Malware Issue 3st Week of July, 2025
ASEC Blog publishes “Mobile Security & Malware Issue 3st Week of July, 2025”
New Variant of ACRStealer Actively Distributed with Modifications
ACRStealer is an Infostealer that has been distributed since last year. It began to be actively distributed from early this year. AhnLab SEcurity intelligence Center (ASEC) has previously covered ACRStealer, which utilizes Google Docs and Steam as a C2 via a Dead Drop Resolver (DDR) technique. [AhnLab SEcurity intelligence
RokRAT Malware Using Malicious Hangul (.HWP) Documents
AhnLab SEcurity intelligence Center (ASEC) recently discovered the distribution of RokRAT malware using a Hangul Word Processor document (.hwp). RokRAT is typically distributed by including a decoy file and malicious script inside a shortcut (LNK) file. However, ASEC found a case where the malware was distributed through HWP documents instead

