Google Chrome Browser (142.0.7444.175/.176) Security Update Advisory
Overview Google has released an update to address a vulnerability in the Chrome(https://www.google.com/chrome) browser. Users of affected versions are advised to update to the latest version. Affected Products Chrome 142.0.7444.175 and earlier (Linux) Chrome 142.0.7444.175/.176 and earlier (Windows) Chrome 142.0.7444.176 and earlier (Mac) Resolved Vulnerabilities
Siemens (PS/IGES Parasolid Translator Component) Product Security Update Advisory
Overview Siemens(https://www.siemens.com) has released a security update that fixes vulnerabilities in products it has supplied. Users of affected products are advised to update to the latest version. Affected Products PS/IGES Parasolid Translator Component V29.0.258 and earlier versions Resolved Vulnerabilities Vulnerability due to an out-of-bounds read
November 18, 2025
November 18, 2025 Hash 1d6eb745da297cb14647b0f4eae15ae6d 2c91a050494e2879e17b874e78fdaa13e 3316eb8dc0c8664991db161114a61e93b URL 1https[:]//valo-fine[.]com/ 2https[:]//topdanangcity[.]com/ 3http[:]//111[.]63[.]97[.]151/17[.]exe IP 149[.]64[.]242[.]249 2221[.]209[.]46[.]93 3101[.]36[.]121[.]4...
IBM Product Security Update Advisory (CVE-2025-36118)
Overview We have released a security update to fix vulnerabilities in IBM products. Users of affected products are advised to update to the latest version. Affected Products CVE-2025-36118 IBM Storage Virtualize Version: 8.4IBM Storage Virtualize Version: 8.5IBM Storage Virtualize version: 8.7IBM Storage Virtualize version: 9.1
Security update advisory for authentication software vulnerabilities
Overview We have released a security update to fix vulnerabilities in DreamSecurity products. Affected product users are advised to update to the latest version. Affected Products MagicLine4NX versions: 1.0.0.0 or later and 1.0.0.30 or earlier Resolved Vulnerabilities Remote code execution vulnerability in DreamSecurity MagicLine4NX
Analysis Report on AI-Based Obfuscated Malicious Apps Using Compromised Legitimate Websites as C2 Servers
1. Overview Malware impersonating a famous Korean delivery service has been continuously distributed, and the threat actor behind it is utilizing various techniques to evade anti-virus (AV) detection. In particular, obfuscation and packing techniques are being used, and many malware strains leveraging these techniques have been discovered. With the recent

