Global Cyber Security News
Keep up to date with some of the latest news articles in the cyber security landscape, worldwide.
- New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPsby [email protected] (The Hacker News) on October 18, 2025 at 11:41 am
Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to Seqrite Labs, the attack chain involves distributing phishing emails containing a ZIP archive as a way to trigger the infection. The cybersecurity company's analysis is based on the ZIP
- Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RATby [email protected] (The Hacker News) on October 18, 2025 at 6:51 am
The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote access trojan (RAT) tracked as HoldingHands RAT (aka Gh0stBins). "The campaign relied on phishing emails with PDFs that contained embedded malicious links," Pei Han Liao, researcher with Fortinet's FortiGuard
- North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malwareby [email protected] (The Hacker News) on October 17, 2025 at 1:33 pm
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group is actively refining its toolset. That's according to new findings from Cisco Talos, which said recent campaigns undertaken by the hacking group have seen the functions of BeaverTail and OtterCookie coming
- Identity Security: Your First and Last Line of Defenseby [email protected] (The Hacker News) on October 17, 2025 at 11:00 am
The danger isn’t that AI agents have bad days — it’s that they never do. They execute faithfully, even when what they’re executing is a mistake. A single misstep in logic or access can turn flawless automation into a flawless catastrophe. This isn't some dystopian fantasy—it's Tuesday at the office now. We've entered a new phase where autonomous AI agents act with serious system privileges. They
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devicesby [email protected] (The Hacker News) on October 17, 2025 at 9:25 am
Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code. The vulnerability, tracked as CVE-2025-9242 (CVSS score: 9.3), is described as an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including
- Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaignby [email protected] (The Hacker News) on October 17, 2025 at 6:03 am
Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign malicious binaries in ransomware attacks. The certificates were "used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware," the Microsoft Threat Intelligence team said in a post shared on X. The tech
- North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contractsby [email protected] (The Hacker News) on October 16, 2025 at 2:56 pm
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,
- Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sitesby [email protected] (The Hacker News) on October 16, 2025 at 2:52 pm
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers, such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. "UNC5142 is characterized by its use of compromised WordPress websites and 'EtherHiding,' a technique used
- LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packetsby [email protected] (The Hacker News) on October 16, 2025 at 2:28 pm
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. "This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely
- Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platformby [email protected] (The Hacker News) on October 16, 2025 at 11:55 am
Scaling the SOC with AI - Why now? Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit
- Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in 'Zero Disco' Attacksby [email protected] (The Hacker News) on October 16, 2025 at 11:38 am
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
- Beware the Hidden Costs of Pen Testingby [email protected] (The Hacker News) on October 16, 2025 at 10:50 am
Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results. The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to breach your system using similar tools and techniques to
- ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & Moreby [email protected] (The Hacker News) on October 16, 2025 at 9:14 am
The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive. Hackers don’t always break systems anymore — they use them. They hide inside trusted apps, copy real websites, and trick people into giving up control
- CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attackby [email protected] (The Hacker News) on October 16, 2025 at 4:26 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-54253 (CVSS score: 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code execution.
- Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Monthsby [email protected] (The Hacker News) on October 15, 2025 at 5:28 pm
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group's expansion to the country beyond Southeast Asia and South America. The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks as Jewelbug, which it said overlaps with
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusionby [email protected] (The Hacker News) on October 15, 2025 at 4:06 pm
U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of BIG-IP's source code and information related to undisclosed vulnerabilities in the product. It attributed the activity to a "highly sophisticated nation-state threat actor," adding the adversary maintained long-term, persistent access to its network. The
- Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risksby [email protected] (The Hacker News) on October 15, 2025 at 2:16 pm
New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing a critical software supply chain risk. "A leaked VSCode Marketplace or Open VSX PAT [personal access token] allows an attacker to directly distribute a malicious extension update across the entire install base,"
- How Attackers Bypass Synced Passkeysby [email protected] (The Hacker News) on October 15, 2025 at 11:30 am
TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) kits can force authentication fallbacks that circumvent strong
- Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shippedby [email protected] (The Hacker News) on October 15, 2025 at 9:23 am
Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant officially ended support for its Windows 10 operating system unless the PCs are enrolled in the Extended Security Updates (ESU) program. Of the 183 vulnerabilities, eight of them are non-Microsoft
- Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Controlby [email protected] (The Hacker News) on October 15, 2025 at 6:50 am
Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges. The shortcomings, tracked as CVE-2023-40151 and CVE-2023-42770, are both rated 10.0 on the CVSS scoring system. "The vulnerabilities affect Red Lion SixTRAK and VersaTRAK