A security vulnerability has been discovered in the Brave Browser, which could allow malicious websites to disguise themselves as trusted sites during file upload or download operations. This issue, identified as CVE-2025-23086, affects certain desktop versions of Brave, posing a potential risk to users who may be unaware of the threat. The flaw is present in Brave Browser versions 1.70.x to 1.73.x, where a feature designed to show the website’s origin in the operating system’s file selector dialog fails to properly detect the origin in specific scenarios. This could lead to a situation where the file dialog displays an incorrect, trusted origin instead of the actual malicious site. Exploiting this vulnerability in conjunction with an open redirector issue on a legitimate, trusted website could enable attackers to trigger file downloads that appear to come from the trusted site. For instance, when a user interacts with a malicious site that uses an open redirect on a trusted domain, the file selector dialog might display the trusted domain as the source, even though the file is coming from the malicious site. This deceptive display could mislead users into thinking the action is legitimate, potentially exposing them to phishing attacks or causing them to unknowingly download malicious files.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...