Security teams are overwhelmed β 960+ alerts a day, and 40% go unchecked.
The real danger? Some of those missed alerts are actual breaches.
AI-SOCs promise to handle every alert automatically β but not all AI delivers.
Hereβs how to tell whatβs real vs. hype β https://thehackernews.com/2025/10/architectures-risks-and-adoption-how-to.html
The real danger? Some of those missed alerts are actual breaches.
AI-SOCs promise to handle every alert automatically β but not all AI delivers.
Hereβs how to tell whatβs real vs. hype β https://thehackernews.com/2025/10/architectures-risks-and-adoption-how-to.html
π₯5π€1
Researchers uncovered "LinkPro," a Golang-based Linux rootkit that uses eBPF to hide processes and activate remotely via a secret βmagic packet.β
It spread through a malicious Docker image deployed on vulnerable Jenkins servers.
Full report β https://thehackernews.com/2025/10/linkpro-linux-rootkit-uses-ebpf-to-hide.html
It spread through a malicious Docker image deployed on vulnerable Jenkins servers.
Full report β https://thehackernews.com/2025/10/linkpro-linux-rootkit-uses-ebpf-to-hide.html
π₯9β‘4π±2
π΄ Hackers are hiding malware inside blockchain smart contracts.
Theyβre pushing stealers like Atomic & Lumma from hacked WordPress sites β updating payloads without ever touching them.
Google found 14,000+ infected pages.
Details here β https://thehackernews.com/2025/10/hackers-abuse-blockchain-smart.html
Theyβre pushing stealers like Atomic & Lumma from hacked WordPress sites β updating payloads without ever touching them.
Google found 14,000+ infected pages.
Details here β https://thehackernews.com/2025/10/hackers-abuse-blockchain-smart.html
π₯15
β‘ North Korean hackers just used the blockchain to hide malware β the first time ever seen.
Google says they used EtherHiding to plant code inside smart contracts, making it nearly impossible to remove and easy to update for just $1.37 in gas fees.
Full story β https://thehackernews.com/2025/10/north-korean-hackers-use-etherhiding-to.html
Google says they used EtherHiding to plant code inside smart contracts, making it nearly impossible to remove and easy to update for just $1.37 in gas fees.
Full story β https://thehackernews.com/2025/10/north-korean-hackers-use-etherhiding-to.html
π₯19π3
Get an inside look at Georgetown's Cybersecurity Master's program. Register for the virtual sample class on October 29.
Attend here β https://thn.news/georgetown-cyber-class
Attend here β https://thn.news/georgetown-cyber-class
π5π₯3
π Microsoft just revoked 200+ trusted certificates β used to sign ransomware disguised as Teams installers.
The fake setup files slipped past security checks for weeks.
Hereβs how Vanilla Tempest pulled it off β https://thehackernews.com/2025/10/microsoft-revokes-200-fraudulent.html
The fake setup files slipped past security checks for weeks.
Hereβs how Vanilla Tempest pulled it off β https://thehackernews.com/2025/10/microsoft-revokes-200-fraudulent.html
π€―17π7π5π3π€3π±1
π¨ CVE-2025-9242 β Critical WatchGuard Fireware flaw (CVSS 9.3)
Unauthenticated attackers can exploit a 520-byte overflow in IKEv2 before cert checks, executing code on VPN firewalls β even spawning a Python shell over TCP.
Patch now β https://thehackernews.com/2025/10/researchers-uncover-watchguard-vpn-bug.html
Unauthenticated attackers can exploit a 520-byte overflow in IKEv2 before cert checks, executing code on VPN firewalls β even spawning a Python shell over TCP.
Patch now β https://thehackernews.com/2025/10/researchers-uncover-watchguard-vpn-bug.html
π₯11π3
π¨ AI agents donβt make mistakes β they execute them.
One wrong logic chain can turn flawless automation into a flawless catastrophe.
The real risk? Most enterprises donβt even know which bots hold the keys.
Identity is the new firewall. Read the 2025-26 Horizons report β https://thehackernews.com/2025/10/identity-security-your-first-and-last.html
One wrong logic chain can turn flawless automation into a flawless catastrophe.
The real risk? Most enterprises donβt even know which bots hold the keys.
Identity is the new firewall. Read the 2025-26 Horizons report β https://thehackernews.com/2025/10/identity-security-your-first-and-last.html
π18π5
β οΈ A fake tech interview β a real breach.
North Korean hackers merged βBeaverTailβ + βOtterCookieβ into a new advanced malwareβkeylogger, wallet stealer, and remote shell all in one.
Learn more β https://thehackernews.com/2025/10/north-korean-hackers-combine-beavertail.html
North Korean hackers merged βBeaverTailβ + βOtterCookieβ into a new advanced malwareβkeylogger, wallet stealer, and remote shell all in one.
Learn more β https://thehackernews.com/2025/10/north-korean-hackers-combine-beavertail.html
π€―14π₯6π6π4π€1
π You open a tax doc.
π» Windows quietly loads malware.
π Your AV dies.
π Youβre owned.
Thatβs how Winos 4.0 and HoldingHands RAT are spreading right now β using Windowsβ own Task Scheduler against it.
Details here β https://thehackernews.com/2025/10/silver-fox-expands-winos-40-attacks-to.html
π» Windows quietly loads malware.
π Your AV dies.
π Youβre owned.
Thatβs how Winos 4.0 and HoldingHands RAT are spreading right now β using Windowsβ own Task Scheduler against it.
Details here β https://thehackernews.com/2025/10/silver-fox-expands-winos-40-attacks-to.html
π±11π6π₯3
Hackers just dropped a new .NET backdoor disguised as a tax notice.
Open the ZIP β boom, your dataβs gone.
It even runs through legit Windows tools so nothing looks off.
Full story β https://thehackernews.com/2025/10/new-net-capi-backdoor-targets-russian.html
Open the ZIP β boom, your dataβs gone.
It even runs through legit Windows tools so nothing looks off.
Full story β https://thehackernews.com/2025/10/new-net-capi-backdoor-targets-russian.html
π15π€―11π₯7π5
π£ Europol just dismantled a SIM farm-for-hire platform that powered 49 million fake accounts used for global fraud.
It let anyone rent verified phone numbers from 80+ countries β to scam, extort, or launder money.
Details β https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html
It let anyone rent verified phone numbers from 80+ countries β to scam, extort, or launder money.
Details β https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html
π₯44π€―12π8π7β‘4π3π±3π€2
π΅οΈ China says the NSA hacked its national time servers β the system that keeps everything in sync.
If that clock went down, it couldβve hit banks, power grids, even space launches.
The attack used foreign SMS exploits, forged certs, and 42 stealth tools.
Read β https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html
If that clock went down, it couldβve hit banks, power grids, even space launches.
The attack used foreign SMS exploits, forged certs, and 42 stealth tools.
Read β https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html
π₯37π14π±13π€8β‘3π3π2π€―1
π¨ 131 Chrome extensions were caught turning WhatsApp Web into spam bots.
They look like βCRM tools,β but secretly send bulk messages.
Over 20,000 users already installed them.
Full details β https://thehackernews.com/2025/10/131-chrome-extensions-caught-hijacking.html
They look like βCRM tools,β but secretly send bulk messages.
Over 20,000 users already installed them.
Full details β https://thehackernews.com/2025/10/131-chrome-extensions-caught-hijacking.html
π14π₯4π€3
π΄ Silent breaches, blockchain malware, and new Android exploits β this weekβs threat roundup proves attackers are getting bolder and smarter.
Catch the highlights:
β‘ F5 breach
β‘ EtherHiding malware
β‘ Cisco rootkits
β‘ Pixnapping 2FA theft
Read WEEKLY RECAP β https://thehackernews.com/2025/10/weekly-recap-f5-breached-linux-rootkits.html
Catch the highlights:
β‘ F5 breach
β‘ EtherHiding malware
β‘ Cisco rootkits
β‘ Pixnapping 2FA theft
Read WEEKLY RECAP β https://thehackernews.com/2025/10/weekly-recap-f5-breached-linux-rootkits.html
π8π1π₯1
π¨ A fake CAPTCHA just breached hospitals, universities, and city networks.
The scary part? Victims copied the attack code themselves β straight from their browser.
Itβs called ClickFix, and it hijacks users through βfix this pageβ pop-ups β no downloads, no phishing email needed.
See how it slips past every control β https://thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html
The scary part? Victims copied the attack code themselves β straight from their browser.
Itβs called ClickFix, and it hijacks users through βfix this pageβ pop-ups β no downloads, no phishing email needed.
See how it slips past every control β https://thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html
π32π±10π₯5π€―3β‘2π2
A Chinese-linked hacking group breached Europeβs telecom defenses β weaponizing antivirus software.
They planted a backdoor in legitimate Norton and Bkav installs.
Payload: SnappyBee, a new ShadowPad variant delivered via DLL side-loading.
Learn more β https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html
They planted a backdoor in legitimate Norton and Bkav installs.
Payload: SnappyBee, a new ShadowPad variant delivered via DLL side-loading.
Learn more β https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html
π₯10π€5π3π€―3π±2
Russiaβs COLDRIVER hackers rebuilt their malware tools in just 5 days.
Meet NOROBOT, YESROBOT, and MAYBEROBOT β hidden behind fake CAPTCHA checks and PowerShell tricks.
Google just exposed how they did it β https://thehackernews.com/2025/10/google-identifies-three-new-russian.html
Meet NOROBOT, YESROBOT, and MAYBEROBOT β hidden behind fake CAPTCHA checks and PowerShell tricks.
Google just exposed how they did it β https://thehackernews.com/2025/10/google-identifies-three-new-russian.html
π14π₯6β‘4π€―4
β οΈ 7 out of 10 threats faced by SOCs begin with phishing.
Phishkits dominate the threat landscape and become increasingly harder to detect.
Act now to set up strong defenses with fresh, actionable intel from 15K orgs β€΅οΈ https://thn.news/threat-intel-tg
Phishkits dominate the threat landscape and become increasingly harder to detect.
Act now to set up strong defenses with fresh, actionable intel from 15K orgs β€΅οΈ https://thn.news/threat-intel-tg
π7π2π€2