Blog

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

Actualités
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,
Read More

Incident de sécurité F5 (16 octobre 2025) (CERT-FR)

Sécurité
Le 15 octobre 2025, F5 a publié un communiqué [1] dans lequel l'éditeur déclare avoir été affecté par un incident de sécurité qu'il attribue à un mode opératoire sophistiqué. L'éditeur a pris connaissance de l'intrusion début août 2025. L'attaquant a réussi à exfiltrer une partie du code source...
Read More

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in « Zero Disco’ Attacks

Actualités
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
Read More

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform

Actualités
Scaling the SOC with AI - Why now?  Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit
Read More