Oct 16, 2025Ravie LakshmananVulnerability / Malware An investigation into the compromise of an Amazon Web Services…
Technology
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a…
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
Oct 16, 2025Ravie LakshmananMalware / Blockchain A threat actor with ties to the Democratic People’s Republic…
How to Assess and Choose the Right AI-SOC Platform
Scaling the SOC with AI – Why now? Security Operations Centers (SOCs) are under unprecedented pressure.…
Beware the Hidden Costs of Pen Testing
Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in…
$15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
Oct 16, 2025Ravie LakshmananCybersecurity / Hacking News The online world is changing fast. Every week, new…
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
Oct 16, 2025Ravie LakshmananVulnerability / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on…
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
Oct 15, 2025Ravie LakshmananVulnerability / Server Security Cybersecurity researchers have disclosed that a critical security flaw…
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a…
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion
Oct 15, 2025Ravie LakshmananVulnerability / Threat Intelligence U.S. cybersecurity company F5 on Wednesday disclosed that unidentified…