The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contractsby [email protected] (The Hacker News) on October 16, 2025 at 2:56 pm
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,
- Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sitesby [email protected] (The Hacker News) on October 16, 2025 at 2:52 pm
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. "UNC5142 is characterized by its use of compromised WordPress websites and 'EtherHiding,' a technique used
- LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packetsby [email protected] (The Hacker News) on October 16, 2025 at 2:28 pm
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. "This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely
- Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platformby [email protected] (The Hacker News) on October 16, 2025 at 11:55 am
Scaling the SOC with AI - Why now? Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit
- Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in "Zero Disco' Attacksby [email protected] (The Hacker News) on October 16, 2025 at 11:38 am
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
UK Computer Companies - Business Directory Uk - Business listings for computer repair, support and hardware companies
Computer Networking, Network Directory - Computer networking solutions providers and companies