North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

16/10/2025 0 Comments 0 tags

A threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks

16/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older,

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform

16/10/2025 0 Comments 0 tags

Scaling the SOC with AI – Why now?  Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960

Beware the Hidden Costs of Pen Testing

16/10/2025 0 Comments 0 tags

Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and

ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

16/10/2025 0 Comments 0 tags

The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

16/10/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

15/10/2025 0 Comments 0 tags

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

15/10/2025 0 Comments 0 tags

U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of BIG-IP’s source code and information related to undisclosed vulnerabilities

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

15/10/2025 0 Comments 0 tags

New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing

How Attackers Bypass Synced Passkeys

15/10/2025 0 Comments 0 tags

TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk