🌟 Photo Sharing Tips: How to Stand Out and Win?
1.Highlight Gate Elements: Include Gate logo, app screens, merchandise or event collab products.
2.Keep it Clear: Use bright, focused photos with simple backgrounds. Show Gate moments in daily life, travel, sports, etc.
3.Add Creative Flair: Creative shots, vlogs, hand-drawn art, or DIY works will stand out! Try a special [You and Gate] pose.
4.Share Your Story: Sincere captions about your memories, growth, or wishes with Gate add an extra touch and impress the judges.
5.Share on Multiple Platforms: Posting on Twitter (X) boosts your exposure an
Trojanized SonicWall NetExtender Targets VPN Users For Credential Theft
HomeNews* Attackers spread a trojanized version of SonicWall‘s NetExtender VPN app to steal login credentials.
The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server, Ganachari said. The manipulated installer—signed by CITYLIGHT MEDIA PRIVATE LIMITED—bypasses digital certificate checks. When a user enters their VPN credentials and clicks "Connect," the malware transmits details like username, password, and domain to a remote server over the internet.
The spread of this rogue software likely targeted users who searched for the NetExtender app on search engines, leading them to phishing sites through tactics such as search engine optimization, malvertising, or social media links. Investigators found that the altered installer contained two key components, "NeService.exe" and "NetExtender.exe," which were both modified for data theft and certificate validation bypass.
Meanwhile, a separate campaign described by German company G DATA has abused ConnectWise software signatures, in an activity group dubbed EvilConwi. Attackers used a method called Authenticode stuffing—which adds malicious code without breaking the program’s trusted digital signature. This method allowed threats to go undetected by using legitimate-seeming software processes.
These attacks start with phishing emails leading to fake downloads. Malicious software implants spyware under the cover of familiar brands, sometimes displaying fake Windows update screens to keep users from shutting down their computers. Security researcher Karsten Hahn noted that attackers used fake AI tool promotions and misleading update visuals to trick users and keep their systems vulnerable to remote access.
Both campaigns relied on known security workarounds, allowing attackers to gather user data while minimizing detection by standard security tools.