๐จ North Koreaโlinked BlueNoroff is running two active campaigns โ GhostCall & GhostHire โ into 2025.
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK โupdates.โ
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report โ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK โupdates.โ
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report โ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
๐10๐3๐คฏ3โก2๐ฅ2
๐จ New Android Trojan โHerodotusโ is on the move.
Itโs hitting phones in ๐ฎ๐น Italy & ๐ง๐ท Brazil โ stealing 2FA codes, logins, even lock PINs โ and typing like a human to slip past fraud detection.
๐ Read full report โ https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
Itโs hitting phones in ๐ฎ๐น Italy & ๐ง๐ท Brazil โ stealing 2FA codes, logins, even lock PINs โ and typing like a human to slip past fraud detection.
๐ Read full report โ https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
๐ฅ12๐คฏ5๐2๐1๐ฑ1
๐ฅ Researchers just broke Intel & AMDโs newest โsecureโ enclaves โ again.
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldnโt stop it.
Learn how TEE-Fail cracks open AI and confidential VMs โ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldnโt stop it.
Learn how TEE-Fail cracks open AI and confidential VMs โ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
๐10๐6๐คฏ2
๐จ CISA confirmed ACTIVE exploitation of new flaws in Dassault Systรจmesโ DELMIA Apriso and XWiki.
One lets any guest run code.
Another gives full admin access.
Hackers are already dropping crypto miners.
Agencies have until Nov 18 to patch โ https://thehackernews.com/2025/10/active-exploits-hit-dassault-and-xwiki.html
One lets any guest run code.
Another gives full admin access.
Hackers are already dropping crypto miners.
Agencies have until Nov 18 to patch โ https://thehackernews.com/2025/10/active-exploits-hit-dassault-and-xwiki.html
๐3๐ฅ2
๐จ 10 fake npm packages (~9.9K installs) hid a cross-platform info stealer.
It spawns a fake terminal, pulls a 24 MB payload from 195.133.79[.]43, and drains keyrings โ not just browser creds.
Instant access to email, cloud, VPNs, and prod DBs.
Read details โ https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html
It spawns a fake terminal, pulls a 24 MB payload from 195.133.79[.]43, and drains keyrings โ not just browser creds.
Instant access to email, cloud, VPNs, and prod DBs.
Read details โ https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html
๐5๐คฏ4
๐จ Russian hackers breached Ukrainian networks โ no malware needed.
They hijacked Windows tools (PowerShell, RDPClip, OpenSSH) to steal data and stay hidden for months.
Real fileless persistence โ living in memory, invisible to AV.
Learn how they did it & how to detect it โ https://thehackernews.com/2025/10/russian-hackers-target-ukrainian.html
They hijacked Windows tools (PowerShell, RDPClip, OpenSSH) to steal data and stay hidden for months.
Real fileless persistence โ living in memory, invisible to AV.
Learn how they did it & how to detect it โ https://thehackernews.com/2025/10/russian-hackers-target-ukrainian.html
๐คฏ13๐7๐ฅ5
๐ด The next big breach wonโt start with a stolen password.
Itโll come from your own AI.
Agentic AIs are the new โconfused deputiesโ โ doing what attackers tell them, with the access you gave them.
The scariest part? You trained the threat โ https://thehackernews.com/2025/10/preparing-for-digital-battlefield-of.html
Itโll come from your own AI.
Agentic AIs are the new โconfused deputiesโ โ doing what attackers tell them, with the access you gave them.
The scariest part? You trained the threat โ https://thehackernews.com/2025/10/preparing-for-digital-battlefield-of.html
๐3๐คฏ2๐ฅ1๐1
โก Your AI-driven compliance might already be non-compliant.
Regulators arenโt ready โ but you can be.
Join the live session Nov 3 to uncover hidden risks and real fixes.
Register free โ https://thehackernews.com/2025/10/discover-practical-ai-tactics-for-grc.html
Regulators arenโt ready โ but you can be.
Join the live session Nov 3 to uncover hidden risks and real fixes.
Register free โ https://thehackernews.com/2025/10/discover-practical-ai-tactics-for-grc.html
โ ๏ธ AI browsers like ChatGPT Atlas and Perplexity Comet can be tricked into using fake data.
A new exploit โ โAI-targeted cloakingโ โ lets attackers show one version of a page to humans and another to AI crawlers.
Same old SEO trick.
New weapon: misinformation at scale.
Read how it works โ https://thehackernews.com/2025/10/new-ai-targeted-cloaking-attack-tricks.html
A new exploit โ โAI-targeted cloakingโ โ lets attackers show one version of a page to humans and another to AI crawlers.
Same old SEO trick.
New weapon: misinformation at scale.
Read how it works โ https://thehackernews.com/2025/10/new-ai-targeted-cloaking-attack-tricks.html
๐2
๐จ PHP servers are under attack.
Mirai, Mozi, and Gafgyt botnets are exploiting old CVEs to hijack WordPress and Craft CMS sites.
Some break-ins start from leftover PhpStorm debug sessions still running in production.
Check if yours is exposed โ https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html
Mirai, Mozi, and Gafgyt botnets are exploiting old CVEs to hijack WordPress and Craft CMS sites.
Some break-ins start from leftover PhpStorm debug sessions still running in production.
Check if yours is exposed โ https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html