Cybersecurity

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets 

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets 

An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv.
“This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform 

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform 

Scaling the SOC with AI – Why now? 
Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks 

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks 

Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems.
The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple

Beware the Hidden Costs of Pen Testing 

Beware the Hidden Costs of Pen Testing 

Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results. 
The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to breach your system using similar tools and techniques to

ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More 

ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More 

The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive.
Hackers don’t always break systems anymore — they use them. They hide inside trusted apps, copy real websites, and trick people into giving up control

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack 

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerability in question is CVE-2025-54253 (CVSS score: 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code execution.

Smashing Security podcast #439: A breach, a burnout, and a bit of Fleetwood Mac 

Smashing Security podcast #439: A breach, a burnout, and a bit of Fleetwood Mac 

A critical infrastructure hack hits the headlines – involving default passwords, boasts on Telegram, and a finale that will make a few cyber-crooks wish the ground would swallow them whole.

Meanwhile we dig into the bit we don’t talk about enough: the human cost of defending companies from hackers – stress, burnout, and how better leadership culture can help security ake teams safer and saner.

All this and more is discussed in episode 439 of “Smashing Security” podcast with cybersecurity veteran Graham Cluley, and his special guest Annabel Berry.

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months 

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months 

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast Asia and South America.
The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks as Jewelbug, which it said overlaps with

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion 

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion 

U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of BIG-IP’s source code and information related to undisclosed vulnerabilities in the product.
It attributed the activity to a “highly sophisticated nation-state threat actor,” adding the adversary maintained long-term, persistent access to its network. The

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X