URL

Tech Optimizer
December 3, 2025
A malicious Rust package named "evm-units," uploaded by a user called "ablerust" to crates.io in mid-April 2025, poses a significant threat to developers on Windows, macOS, and Linux. It has over 7,000 downloads and is designed to execute its payload stealthily, depending on the victim's operating system and the presence of Qihoo 360 antivirus. The package disguises itself as a function that returns the Ethereum version number and can detect Qihoo 360 antivirus software. It downloads and executes different payloads based on the operating system: a script for Linux, a file for macOS, and a PowerShell script for Windows. If the antivirus is not detected, it creates a Visual Basic Script wrapper to run a hidden PowerShell script. The package targets the Web3 community, particularly developers, and is linked to the widely used "uniswap-utils" package. Both "evm-units" and "uniswap-utils" have been removed from the repository.
AppWizard
December 1, 2025
Reddit users have discovered a method to access the new Gemini voices for Google Home devices before the official rollout by manually initiating the onboarding process. This workaround allows users to change their voice settings while still using Google Assistant. The upgrade introduces ten new voice options and is part of an early access program being rolled out on a per-home basis. Users can enter a specific URL to modify voice settings on their Home and Nest devices, but the full suite of Gemini features will not be accessible through this method. The longevity of this hack is uncertain, as it is unclear if Google will address it.
AppWizard
November 30, 2025
Google is introducing a redesigned link preview feature in its Messages app, focusing on larger website titles and thumbnails while removing full link URLs and descriptions. The new previews will display a general site URL beneath the title and prioritize a minimalist design, resembling Google Discover cards. Users can access the full URL by copying it or adjusting settings to disable link previews. The update is rolling out with version 2025112100RC01 on the beta channel, with wider availability expected soon.
Winsage
November 25, 2025
A new wave of ClickFix attacks has emerged, using fake Windows Update screens and PNG image steganography to deploy infostealing malware like LummaC2 and Rhadamanthys. The attacks trick users into executing a command by pressing Win+R and pasting a command copied to their clipboard. Attackers have shifted from using “Human Verification” lures to more convincing full-screen fake Windows Update screens. The fake update prompts users to run a command that initiates mshta.exe with a URL containing a hex-encoded IP address, leading to the download of obfuscated PowerShell and .NET loaders. A notable feature of the campaign is the use of a .NET steganographic loader that hides shellcode within the pixel data of a PNG image, which is decrypted and reconstructed in memory. The shellcode is Donut-packed and injected into processes like explorer.exe using standard Windows APIs. Huntress has been monitoring these ClickFix clusters since early October, noting the use of the IP address 141.98.80[.]175 and various paths for the initial mshta.exe stage, with subsequent PowerShell stages hosted on domains linked to the same infrastructure. Despite the disruption of Rhadamanthys’ infrastructure in mid-November, active domains continue to serve the ClickFix lure, although the Rhadamanthys payload appears to be unavailable. To mitigate the attack, disabling the Windows Run box through Group Policy or registry settings is recommended, along with monitoring for suspicious activity involving explorer.exe. User education is critical, emphasizing that legitimate processes will not require pasting commands into the Run prompt. Analysts can check the RunMRU registry key to investigate potential ClickFix abuse.
Winsage
November 12, 2025
Rob Beard, product manager at Google, discussed Cameyo, a platform that allows users to access web applications and legacy software seamlessly. It enables IT administrators to deliver applications to users' devices quickly, enhancing efficiency and simplifying application management. Google has integrated Cameyo with Chrome Enterprise Premium to streamline the deployment and management of virtual applications, allowing access controls to be managed through the Google Admin Console. The integration also introduces security features like URL filtering and data loss prevention to protect sensitive information.
Tech Optimizer
November 11, 2025
Umami has released version 3 of its open source analytics platform, featuring a redesigned interface, advanced tracking capabilities, and exclusive support for PostgreSQL, discontinuing MySQL compatibility. The update includes a streamlined navigation experience, organized reports, the ability to store filters as URL parameters, and support for adding or editing multiple filters simultaneously. New analysis functions such as Segments and Cohorts have been introduced, along with tracking features like short URLs and invisible pixels. A central admin panel has been added for easier management of users, teams, and websites. Umami is licensed under MIT, allowing for self-hosting or cloud deployment.
Search