MEDIUMVulnerability
Global

Digital asset operating system Virtex selects Gold-i as first integration partner

·Source: Finextra

Updated:

Executive Summary

Virtex Technologies, an operating system for digital asset brokerages, has selected Gold-i, a global leader in FX and crypto trading technology, as its first integration partner.

Analysis

Virtex Technologies, an operating system for digital asset brokerages, has selected Gold-i, a global leader in FX and crypto trading technology, as its first integration partner.
Source Attribution

Originally published by Finextra on May 13, 2026.

Related Threats

CRITICALVulnerabilityNEW

Microsoft rejects critical Azure vulnerability report, no CVE issued

A security researcher claims Microsoft quietly fixed an Azure Backup for AKS vulnerability after rejecting his report, and without issuing a CVE. Microsoft disputes the claim, telling BleepingComputer the behavior was expected and that "no product changes were made," despite the researcher documenting a silent fix. [...]

BleepingComputer
MEDIUMVulnerability

Another detail emerges about Instructure’s agreement with ShinyHunters; Debate continues about whether to pay

Media outlets have been understandably eager to learn whether Instructure paid ShinyHunters after the latter attacked them for a second time on May 7. Considering that they pledged to be more transparent, DataBreaches doesn’t fully understand why Instructure wasn’t more forthright about the payment issue in its update, unless they were trying to avoid encouraging... Source

DataBreaches.net
CRITICALVulnerability

NVD CRITICAL: CVE-2020-37239 — libbabl 0.1.62 contains a broken double free detection vulnerability that allows...

libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.

CVE-2020-37239
NIST NVD