Best of CybersecurityOctober 2025

  1. 1
    Article
    Avatar of hnHacker News·25w

    Hacktivate

    Paul Hudson built Hacktivate, a capture-the-flag game teaching cybersecurity fundamentals to teens through 240 challenges covering SQL injection, cryptography, networking, and steganography. The app runs entirely locally on Apple devices using Swift and SwiftUI, featuring a sandboxed environment with simulated servers, terminals, and networks. Inspired by classic games like Syndicate and Command & Conquer, it combines retro aesthetics with practical skills like packet sniffing, hash cracking, and digital forensics. The 45,000+ lines of code include a Linux terminal emulator, web server, and various security tools, all designed to provide structured, privacy-preserving learning without external dependencies.

  2. 2
    Article
    Avatar of thnThe Hacker News·27w

    New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs

    Security researchers discovered ChaosBot, a Rust-based backdoor that uses Discord channels for command-and-control operations. The malware spreads through compromised VPN credentials and phishing attacks, enabling attackers to execute commands, capture screenshots, and transfer files. A related threat, Chaos-C++ ransomware, combines file encryption with destructive deletion of large files and cryptocurrency wallet hijacking through clipboard manipulation. Both threats demonstrate increasingly sophisticated attack techniques targeting financial services and general users.

  3. 3
    Video
    Avatar of techlinkedTechLinked·25w

    Ryzen, Not Again…

    AMD rebrands older Zen 2 and Zen 3 Plus chips as Ryzen 10 and 100 series without hardware changes. Hackers exploit a Red Tiger fork to steal Discord user data through fake game mods. Microsoft faces Australian lawsuit for allegedly forcing customers to pay for Copilot in Microsoft 365 subscriptions. Tesla's Mad Max driving mode draws federal scrutiny for exceeding speed limits. Microsoft's financial filings reveal $4.7 billion in losses tied to OpenAI investment. Researchers develop biodegradable memory chips using mushroom tissue as potential silicon alternatives.

  4. 4
    Article
    Avatar of ieeespectrumIEEE Spectrum·26w

    Real-Time Audio Deepfake Tech Is Here

    Real-time audio deepfakes have become a reality, enabling convincing voice impersonation with zero latency using open-source tools and consumer-grade hardware. NCC Group demonstrated a system that successfully fooled targets in voice phishing attacks by combining AI voice cloning with caller ID spoofing. The technology works on laptops with entry-level GPUs and requires only a button press to activate. While video deepfakes are advancing rapidly through models like Alibaba's WAN 2.2 and Google's Gemini Flash 2.5, they still lack real-time capability and show telltale signs like mismatched emotions. Security experts recommend developing alternative authentication methods beyond voice and video verification.