ICYMI: 2025-10-16
Latest Headlines
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
One Republican Now Controls a Huge Chunk of US Election Infrastructure
Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
AISLE Emerges From Stealth With AI-Based Reasoning System to Remediate Vulnerabilities on the Fly
Matters.AI Raises $6.25 Million to Safeguard Enterprise Data
Organizations Warned of Exploited Adobe AEM Forms Vulnerability
Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin
F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts
North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware
Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT
Qilin Ransomware Using Ghost Bulletproof Hosting to Attack Organizations Worldwide
Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information
Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities
New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials
PhantomVAI Loader Attacking Organizations Worldwide to Deliver AsyncRAT, XWorm, FormBook and DCRat
CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks
Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware
Windows 11 updates break localhost (127.0.0.1) HTTP/2 connections
Auction giant Sotheby’s says data breach exposed customer information
Have I Been Pwned: Prosper data breach impacts 17.6 million accounts
Hackers exploit Cisco SNMP flaw to deploy rootkit on switches
Microsoft: Office 2016 and Office 2019 have reach end of support
Gladinet fixes actively exploited zero-day in file-sharing software
Unified Exposure Management Platforms: The Future of Preemptive Cyber Defense
North Korean hackers use EtherHiding to hide malware on the blockchain
Microsoft debuts Copilot Actions for agentic AI-driven Windows tasks
– MTZ