Latest Cybersecurity News and Articles


LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

16 October 2025
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. "This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely

AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly

16 October 2025
AISLE aims to automate the vulnerability remediation process by detecting, exploiting, and patching software vulnerabilities in real time. The post AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly appeared first on SecurityWeek.

Matters.AI Raises $6.25 Million to Safeguard Enterprise Data

16 October 2025
The company’s AI Security Engineer autonomously keeps enterprise data protected across devices and environments. The post Matters.AI Raises $6.25 Million to Safeguard Enterprise Data appeared first on SecurityWeek.

Organizations Warned of Exploited Adobe AEM Forms Vulnerability

16 October 2025
A public PoC existed when Adobe patched the Experience Manager Forms (AEM Forms) bug in early August. The post Organizations Warned of Exploited Adobe AEM Forms Vulnerability appeared first on SecurityWeek.

Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking

16 October 2025
Fuji Electric has released patches and Japan’s JPCERT has informed organizations about the vulnerabilities.  The post Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking appeared first on SecurityWeek.

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform

16 October 2025
Scaling the SOC with AI - Why now?  Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in "Zero Disco' Attacks

16 October 2025
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple

Cisco Routers Hacked for Rootkit Deployment

16 October 2025
Threat actors are exploiting CVE-2025-20352, a recent Cisco zero-day, to deploy a rootkit on older networking devices. The post Cisco Routers Hacked for Rootkit Deployment appeared first on SecurityWeek.

US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin

16 October 2025
In an indictment, federal prosecutors charged Prince Holding Group chairman Chen Zhi with wire fraud conspiracy and money laundering conspiracy. The post US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin appeared first on SecurityWeek.

Beware the Hidden Costs of Pen Testing

16 October 2025
Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results.  The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to breach your system using similar tools and techniques to

Four-Year Prison Sentence for PowerSchool Hacker

16 October 2025
Matthew Lane pleaded guilty in May to extorting two companies after hacking into their networks and stealing information. The post Four-Year Prison Sentence for PowerSchool Hacker appeared first on SecurityWeek.

ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

16 October 2025
The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive. Hackers don’t always break systems anymore — they use them. They hide inside trusted apps, copy real websites, and trick people into giving up control

F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts 

16 October 2025
More information has come to light on the cyberattack disclosed this week by F5, including on attribution and potential risks. The post F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts  appeared first on SecurityWeek.

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

16 October 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-54253 (CVSS score: 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code execution.

Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months

15 October 2025
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group's expansion to the country beyond Southeast Asia and South America. The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks as Jewelbug, which it said overlaps with

SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta

15 October 2025
Premier industrial cybersecurity conference Offers 70+ sessions, five training courses, and and ICS Village CTF competition. The post SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta appeared first on SecurityWeek.

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

15 October 2025
U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of BIG-IP's source code and information related to undisclosed vulnerabilities in the product. It attributed the activity to a "highly sophisticated nation-state threat actor," adding the adversary maintained long-term, persistent access to its network. The

F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data

15 October 2025
F5 has not shared too much information on the threat actor, but the attack profile seems to point to China. The post F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data appeared first on SecurityWeek.

Webinar Today: Fact vs. Fiction – The Truth About API Security

15 October 2025
Get practical guidance to protect APIs against the threats attackers are using right now. The post Webinar Today: Fact vs. Fiction – The Truth About API Security appeared first on SecurityWeek.

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

15 October 2025
New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing a critical software supply chain risk. "A leaked VSCode Marketplace or Open VSX PAT [personal access token] allows an attacker to directly distribute a malicious extension update across the entire install base,"