Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11539

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-12-08 12:46:24 thehackernews VULNERABILITIES Critical React2Shell Flaw Exploited by Multiple Threat Actors
A severe vulnerability, CVE-2025-55182, in React Server Components allows remote code execution, exploited within hours of its disclosure. The flaw, also known as React2Shell, has a CVSS score of 10.0, making it a critical threat to affected systems. Amazon identified attack attempts from Chinese hacking groups Earth Lamia and Jackpot Panda shortly after the vulnerability's disclosure. Multiple cybersecurity firms, including Coalition and Wiz, report widespread exploitation efforts, indicating opportunistic attacks by various threat actors. The Shadowserver Foundation detected a decrease in vulnerable IP addresses, from 77,664 to 28,964, as organizations respond to the threat. The vulnerability's rapid exploitation underscores the need for immediate patching and proactive vulnerability management to mitigate risks. Organizations are urged to prioritize updates and monitor systems closely to prevent potential breaches and operational disruptions.
Details
2025-12-08 12:24:14 theregister VULNERABILITIES UK Home Office Criticized for Concealing Facial Recognition Bias Issues
The UK's Information Commissioner's Office (ICO) criticized the Home Office for not disclosing biases in police facial recognition technology, despite ongoing engagements. The ICO learned of historical biases in the Police National Database's (PND) facial recognition algorithm only recently, raising concerns about transparency. Tests revealed Cognitec's algorithm had significant weaknesses, particularly in accurately identifying Black subjects, with a higher false positive rate for Black females. The Home Office has reissued training and guidance to police forces to mitigate risks and ensure manual reviews of facial recognition results. A new algorithm, tested independently, showed no statistically significant bias and is slated for evaluation next year to enhance accuracy and fairness. The UK government continues to invest heavily in facial recognition technology, emphasizing its role in law enforcement despite criticisms of its deployment. The Inspectorate of Constabulary and the Forensic Science Regulator will review police use of facial recognition technology following the recent findings.
Details
2025-12-08 12:02:22 thehackernews CYBERCRIME Retailers Brace for Increased Cyber Threats During Holiday Season
Retailers face heightened cyber risks during the holiday season, with increased bot-driven fraud, credential stuffing, and account takeover attempts. Attackers leverage leaked username/password lists to automate credential stuffing, targeting retail login portals and mobile apps for immediate financial gain. Historical breaches, like the 2013 Target incident, illustrate the risks of third-party access, emphasizing the need for stringent credential management. Retailers must balance security and user experience by implementing adaptive multi-factor authentication (MFA) to protect against risky logins without disrupting customer journeys. Strong security measures, including blocking compromised credentials and using passwordless options, are recommended to mitigate credential abuse. Protecting employee and partner accounts with mandatory MFA and strict access controls can reduce the operational impact of potential breaches. Retailers should prepare for peak season by investing in layered defenses against automated attacks and testing failover procedures to ensure operational continuity.
Details
2025-12-08 11:17:21 theregister DATA BREACH Barts Health NHS Trust Seeks Court Order to Block Data Leak
Barts Health NHS Trust confirmed a data breach involving patient and staff information due to Clop's exploitation of an Oracle E-Business Suite vulnerability. The breach impacted individuals liable for treatment payments and former staff with salary-related issues, alongside supplier details in the public domain. The trust is pursuing a High Court order to prevent the publication of stolen data, which Clop has threatened to release on the dark web. The breach was linked to a critical Oracle EBS flaw, CVE-2025-61882, exploited by Clop since August 2025, before Oracle's patch release in October. Barts Health is collaborating with NHS England, the National Cyber Security Centre, and law enforcement to address the breach and secure its systems. Despite the breach, Barts Health reports that its electronic patient record and core IT systems remain unaffected and secure. The incident adds Barts Health to a list of high-profile victims, including the University of Pennsylvania, affected by Clop's widespread Oracle EBS attacks.
Details
2025-12-08 11:08:05 thehackernews MALWARE New Android Malware Families Enhance Data Theft Capabilities
Cybersecurity experts from Intel 471, CYFIRMA, and Zimperium have identified two new Android malware families, FvncBot and SeedSnatcher, alongside an upgraded version of ClayRat, posing significant threats to users. FvncBot masquerades as a security app targeting Polish mobile banking users, utilizing features such as keylogging, web-inject attacks, and hidden virtual network computing for financial fraud. SeedSnatcher, distributed via Telegram, is designed to steal cryptocurrency wallet seed phrases and intercept SMS messages to capture two-factor authentication codes, with operations likely based in China. ClayRat's latest version exploits Android's accessibility services to perform keystroke logging, screen recording, and deploy phishing overlays, enhancing its ability to take over devices completely. The malware families employ advanced evasion techniques, including dynamic class loading and stealthy content injection, making detection and prevention more challenging for cybersecurity defenses. FvncBot and ClayRat leverage accessibility services intended for aiding users with disabilities, allowing them to gain elevated privileges and execute malicious activities undetected. These developments highlight the evolving threat landscape of Android malware, emphasizing the need for robust security measures and user awareness to mitigate risks associated with mobile device vulnerabilities.
Details
2025-12-08 09:21:14 thehackernews VULNERABILITIES Critical Vulnerabilities Exploited in WordPress and ICTBroadcast Platforms
A critical RCE vulnerability in the Sneeit Framework plugin for WordPress, CVE-2025-6389, is actively exploited, affecting over 1,700 installations. The flaw allows unauthenticated code execution and backdoor creation. Wordfence reported over 131,000 exploitation attempts since public disclosure on November 24, 2025, with attackers creating malicious admin accounts and uploading backdoor PHP files. The vulnerability is patched in version 8.4, released on August 5, 2025, but many installations remain unpatched, posing ongoing risks to affected sites. Concurrently, a critical flaw in ICTBroadcast, CVE-2025-2611, is being exploited to deploy the "Frost" DDoS botnet, targeting specific systems with tailored attack logic. The "Frost" binary leverages fourteen exploits for fifteen CVEs, executing attacks only when specific indicators are detected, suggesting a highly targeted approach. Less than 10,000 systems are vulnerable to the ICTBroadcast flaw, indicating a limited but focused botnet operation. Organizations using these platforms are urged to apply patches immediately and monitor for signs of compromise to mitigate potential threats.
Details
2025-12-08 06:51:50 thehackernews NATION STATE ACTIVITY MuddyWater Launches UDPGangster Backdoor in Targeted Cyber Espionage Campaign
Iranian hacking group MuddyWater is deploying a new backdoor, UDPGangster, targeting users in Turkey, Israel, and Azerbaijan, according to Fortinet FortiGuard Labs. UDPGangster uses the User Datagram Protocol (UDP) for command-and-control, enabling remote control, file exfiltration, and additional payload deployment. Attackers employ spear-phishing tactics, distributing malicious Microsoft Word documents that activate payloads when macros are enabled. Phishing messages often impersonate the Turkish Republic of Northern Cyprus Ministry of Foreign Affairs, inviting recipients to fake online seminars. The malicious payload establishes persistence via Windows Registry changes and uses anti-analysis checks to evade security research efforts. UDPGangster communicates with an external server over UDP port 1269 to exfiltrate data and execute commands, posing a significant threat to targeted sectors. Organizations are advised to be vigilant against unsolicited documents, especially those requesting macro activation, to mitigate potential risks.
Details
2025-12-08 05:07:03 theregister VULNERABILITIES Gartner Advises Blocking AI Browsers Due to Security Concerns
Gartner advises organizations to block AI browsers like Perplexity’s Comet and OpenAI’s ChatGPT Atlas, citing security risks from default settings prioritizing user experience over security. AI browsers can expose sensitive user data, such as browsing history and open tabs, to cloud-based AI back-ends, increasing the risk of data exposure. The advisory suggests assessing AI browser back-end security measures to determine acceptable risk levels before approval for organizational use. Potential risks include rogue agent actions, erroneous decisions, and credential abuse if AI browsers are manipulated into visiting phishing sites. Users might misuse AI browsers for automating mandatory tasks, risking errors in processes like procurement, leading to unintended purchases. Mitigation strategies include restricting AI browser data retention and disabling email functionalities to limit potential misuse. Gartner emphasizes the need for comprehensive risk assessments and monitoring to manage AI browser use, likely resulting in numerous prohibited use cases.
Details
2025-12-08 02:03:17 theregister DATA BREACH South Korea Tightens Cybersecurity Standards After Coupang Data Breach
South Korea plans to enhance security certifications following a data breach at Coupang, affecting data of over half the nation’s population. Coupang reported no evidence of stolen data reuse, yet the incident prompted government action to prevent future breaches. New standards will be mandatory for major online entities, with post-incident audits required to identify security failures. The breach underscores the critical need for robust cybersecurity measures in protecting sensitive consumer data. This initiative reflects a growing trend of governments imposing stricter cybersecurity regulations on digital platforms. Companies operating in South Korea may face increased compliance costs and operational changes to meet new security requirements.
Details
2025-12-08 00:18:24 theregister VULNERABILITIES Apache Tika Users Warned of Critical Metadata Parsing Vulnerability
Apache Foundation has issued a warning about a critical vulnerability, CVE-2025-66516, in its Tika toolkit, which scores a 10.0 severity rating. Tika, used for metadata extraction from over 1,000 file formats, has a flaw that could allow attackers to exploit XML External Entity injection. The vulnerability is linked to the tika-core component, requiring users to upgrade to version 3.2.2 or later to mitigate the risk. Previous fixes for related vulnerabilities may not protect users who only updated the tika-parser-pdf-module without addressing tika-core. Apache's advisory clarifies that earlier Tika releases had the PDFParser in a different module, complicating the patching process for users. Organizations relying on Tika should review their systems to ensure all components are updated to prevent potential exploitation. OVH, a French cloud service provider, is enhancing its DDOS protection by adding 2-3Tbps of capacity weekly in response to new attack patterns. Recent DDOS attacks, originating from the US and South America, have reached sizes of 15-16Tbps, targeting infrastructure via major US cities. The company plans to deploy 100Tbps of DDOS-deflectors to safeguard its operations against these escalating threats. This proactive expansion aims to maintain service reliability and protect client data from disruptions caused by these large-scale attacks. The rise in attack volume underscores the need for robust DDOS mitigation strategies in the face of evolving cyber threats. Representative August Pfluger introduced the Cyber Deterrence and Response Act to empower the National Cyber Director with authority for cyber threat attribution. The bill seeks to establish a government-wide process for identifying and sanctioning cyber adversaries, aligning agencies under unified evidentiary standards. Provisions include collaboration with private companies and international allies to enhance threat intelligence sharing and response capabilities. The legislation aims to strengthen national security by holding foreign hackers accountable and protecting critical infrastructure from cyberattacks. This initiative reflects ongoing efforts to develop a comprehensive cybersecurity strategy amid rising geopolitical tensions and cyber threats. The National Institute of Standards and Technology (NIST) has published three new documents to guide the secure onboarding of Internet of Things (IoT) devices. These guidelines focus on secure provisioning, network layer onboarding, and lifecycle management to prevent IoT devices from becoming attack vectors. IoT devices often lack built-in security, posing significant risks to networks; NIST's publications aim to address these vulnerabilities. Organizations managing IoT technology are encouraged to adopt these practices to enhance device security and reduce potential cyber threats. The initiative highlights the critical need for standardized security measures in the rapidly growing IoT landscape. The Department of Justice has dismantled Tickmilleas.com, a fraudulent cryptocurrency trading site mimicking the legitimate Tickmill platform. The scam site targeted users with promises of high returns, tricking them into depositing funds, which were then stolen by the fraudsters. Believed to be linked to Chinese and Burma-based criminal gangs, the site also distributed fake apps on Google Play and Apple’s App Store. This action is part of the DOJ's broader crackdown on "pig-butchering" scams, which are proliferating in Asia and other regions. The swift response by the Scam Center Task Force underscores the ongoing threat of cryptocurrency fraud and the need for vigilant monitoring.
Details
2025-12-07 15:14:30 bleepingcomputer VULNERABILITIES Portugal's New Cybercrime Law Shields Ethical Hackers from Prosecution
Portugal's revised cybercrime law now offers legal protection for security researchers conducting good-faith vulnerability assessments, under specific conditions outlined in Article 8.o-A. This legal exemption permits actions previously deemed illegal, such as unauthorized system access, when performed to enhance cybersecurity. Security researchers must adhere to defined limits to qualify for immunity, ensuring their activities serve the public interest in cybersecurity. The initiative aligns with global trends, as Germany and the U.S. have introduced similar protections, fostering a supportive environment for ethical hacking. These legal frameworks encourage proactive identification and reporting of security flaws, reducing the risk of criminal liability for researchers. By legally recognizing ethical hacking, Portugal aims to strengthen its cybersecurity posture and promote responsible vulnerability disclosure. The move reflects an increasing global acknowledgment of the critical role ethical hackers play in safeguarding digital infrastructure.
Details
2025-12-06 19:12:49 bleepingcomputer VULNERABILITIES React2Shell Flaw Exploited, Over 30 Organizations Compromised
React2Shell, a critical remote code execution vulnerability (CVE-2025-55182), has been exploited to compromise over 30 organizations, affecting frameworks like Next.js that utilize React Server Components. The flaw allows attackers to execute arbitrary commands via a single HTTP request, with over 77,000 IP addresses identified as vulnerable, primarily in the United States. Security researcher Maple3142 released a proof-of-concept for the exploit, leading to increased scanning and automated attacks from various countries, including China and the Netherlands. Compromised organizations have faced reconnaissance and data theft attempts, with attackers deploying Cobalt Strike beacons and bypassing endpoint security using PowerShell scripts. State-associated Chinese threat actors, such as Earth Lamia and Jackpot Panda, have been linked to these intrusions, leveraging the vulnerability for initial access and further exploitation. In response, companies have rushed to patch systems, with Cloudflare implementing emergency mitigations, though initial updates caused temporary outages. CISA has mandated federal agencies to patch the vulnerability by December 26, 2025, emphasizing the need for immediate action to prevent further exploitation.
Details
2025-12-06 15:29:45 thehackernews VULNERABILITIES Over 30 Security Flaws Found in AI-Powered Coding Tools
Researchers have identified over 30 vulnerabilities in AI-driven Integrated Development Environments (IDEs), potentially leading to data theft and remote code execution (RCE) attacks. The vulnerabilities, named IDEsaster, impact popular IDEs and extensions such as GitHub Copilot, Cursor, and Zed.dev, with 24 issues assigned CVE identifiers. The flaws exploit prompt injection primitives combined with legitimate IDE features, enabling data exfiltration and RCE through AI agents. Attack vectors include context hijacking and tool poisoning, which can be triggered by user-added references or malicious inputs parsed by AI models. Recommendations include applying least privilege principles, minimizing injection vectors, and employing sandboxing to mitigate risks associated with AI agents. The findings highlight the expanded attack surface introduced by AI tools in development environments, posing risks like prompt injection and supply chain compromise. The research underscores the need for a "Secure for AI" approach to address security challenges posed by AI components in software development.
Details
2025-12-06 15:24:18 bleepingcomputer VULNERABILITIES Surge in VPN Login Attempts Targets Palo Alto and SonicWall Systems
A significant campaign is targeting Palo Alto GlobalProtect portals and SonicWall SonicOS API endpoints, originating from 7,000 IP addresses linked to German IT firm 3xK GmbH. The activity involves brute force login attempts on GlobalProtect portals, followed by scanning of SonicWall API endpoints, indicating a methodical approach to uncover vulnerabilities. GreyNoise identified three client fingerprints linked to previous scanning attempts, suggesting a coordinated effort by the same actor. The campaign generated over 9 million HTTP sessions, with 62% of attacking IPs located in Germany, emphasizing the scale of the operation. Palo Alto Networks confirmed these are credential-based attacks, not software vulnerabilities, advising the use of Multi-Factor Authentication to mitigate risks. Organizations are urged to monitor authentication surfaces for unusual activity and implement dynamic, context-aware blocking strategies. This activity underscores the need for vigilance in defending against credential abuse and highlights the importance of robust identity and access management practices.
Details
2025-12-06 11:47:41 thehackernews VULNERABILITIES CISA Adds Critical React2Shell Flaw to Exploited Vulnerabilities List
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-55182, a critical React Server Components flaw, to its Known Exploited Vulnerabilities catalog due to active exploitation reports. This vulnerability, with a CVSS score of 10.0, allows unauthenticated remote code execution via insecure deserialization in the React library's Flight protocol, affecting server-client communications. Attackers can exploit this flaw by sending crafted HTTP requests, enabling arbitrary command execution on affected servers, with some attacks deploying cryptocurrency miners and other payloads. React version updates 19.0.1, 19.1.2, and 19.2.1 address the vulnerability, impacting frameworks like Next.js, React Router, and others; users are urged to update immediately. Exploitation attempts have been linked to Chinese hacking groups, including Earth Lamia and Jackpot Panda, with over 30 organizations affected across various sectors. Security firms such as Palo Alto Networks and Bitdefender have observed reconnaissance and exploitation activities, including the deployment of SNOWLIGHT and VShell tools. Researchers released proof-of-concept exploits, emphasizing the need for rapid patching, while Federal agencies must comply with updates by December 26, 2025, under BOD 22-01. The vulnerability affects approximately 2.15 million internet-facing services, highlighting the extensive exposure and urgency for remediation efforts.
Details