News
October 16, 2025 • 1 min read • Hackernews
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal
October 16, 2025 • 5 min read • theVerge
Microsoft wants you to talk to your PC and let AI control it
October 16, 2025 • 1 min read • Hackernews
Architectures Risks and Adoption How to Assess and Choose the Right AI-SOC Platform
Scaling the SOC with AI - Why now? Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40%
October 16, 2025 • 1 min read • Hackernews
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in Zero Disco Attacks
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score 7.7), a stack
October 16, 2025 • 1 min read • Hackernews
Beware the Hidden Costs of Pen Testing
Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results. The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to
October 16, 2025 • 1 min read • Hackernews
ThreatsDay Bulletin 15B Crypto Bust Satellite Spying Billion-Dollar Smishing Android RATs More
The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive. Hackers don’t always break systems anymore —
October 16, 2025 • 2 min read • theVerge
Microsoft is reportedly moving its Surface manufacturing out of China
October 16, 2025 • 1 min read • Hackernews
CISA Flags Adobe AEM Flaw with Perfect 100 Score Already Under Active Attack
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-54253 (CVSS score 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code
October 15, 2025 • 5 min read • theVerge
Here are the best AirPods deals you can get right now
October 15, 2025 • 2 min read • theVerge
Googles AI video generator is getting better editing and more audio