Notepad++, a widely used text and source-code editor for Windows, recently addressed a significant security issue in its update mechanism when researchers and users noticed that its built-in updater tool (WinGUp) was retrieving and executing malicious executables instead of legitimate update files. In some reported cases, the updater launched a file (AutoUpdater.exe) from the temporary directory that performed reconnaissance commands on the system and exfiltrated data to external services — behavior characteristic of malware rather than a normal software update. This prompted an emergency patch release (version 8.8.9) to fix the problem. The root cause of the issue was insufficient validation of update files by the WinGUp updater. WinGUp fetched an XML file from the Notepad++ update server that contained a URL pointing to the latest installer. Because the updater did not properly verify digital certificates and signatures of downloaded installers, attackers capable of intercepting or hijacking network traffic could redirect WinGUp to a malicious server and trick it into downloading a compromised binary. This form of man-in-the-middle (MitM) abuse allowed threat actors to push malware disguised as a legitimate update, potentially leading to unauthorized code execution on affected systems. To mitigate this threat, the Notepad++ team strengthened update security in version 8.8.9 by enforcing certificate and signature verification for update files; any update failing verification is now aborted. Users are strongly advised to update immediately, avoid using unsecured networks when updating software, and scan systems for indicators of compromise if older versions were used recently. Organizations should also consider restricting update traffic and monitoring unexpected updater activity to prevent similar attacks.
Cybercriminals are now weaponizing legitimate hotel reservation data to trick travelers into surrendering their payment details. This "Reservation Hijack Scam" stands out b...
A serious security issue has been discovered in nginx-ui, which can allow attackers to take full control of a system. This vulnerability is tracked as CVE-2026-33026. The problem e...
A sophisticated phishing campaign is targeting Spanish speaking users across Latin America and Europe, aiming to deploy Windows banking malware such as Casbaneiro (also known as Me...