Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11761

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-09-10 16:09:05 theregister CYBERCRIME Jaguar Land Rover Cyberattack Disrupts Operations and Affects Data
Jaguar Land Rover experienced a cyberattack that led to system shutdowns, impacting retail and production operations significantly. Initial assessments suggested no data theft, but further investigations revealed some data was affected, prompting regulatory notifications. The attack has forced employees to work from home, with services like parts ordering and diagnostics disrupted, affecting customer service. Cybersecurity specialists are working continuously to restore global applications safely, while forensic investigations proceed to assess the full impact. Scattered Spider, a known ransomware group, is suspected of the breach, possibly collaborating with ShinyHunters and Lapsus$ in targeting multiple sectors. The incident underscores the vulnerability of critical IT systems in the automotive industry, highlighting the need for robust cybersecurity measures. JLR continues to update stakeholders and express regret for the ongoing disruptions, emphasizing their commitment to resolving the situation.
Details
2025-09-10 16:01:25 bleepingcomputer MISCELLANEOUS Google Introduces AI Photo Verification in Pixel 10 Devices
Google has integrated C2PA Content Credentials into Pixel 10 cameras and Google Photos to help users identify AI-generated or altered images, addressing growing concerns over synthetic media. Each JPEG photo captured on Pixel 10 will automatically include Content Credentials, detailing its creation process, enhancing transparency and trust in digital media. The Content Credentials system uses digital signature technology to secure information about media creation, similar to methods used in online transactions and mobile apps. If images are edited, Google Photos updates the Content Credentials, maintaining a complete history of changes without compromising user anonymity. The system operates offline and is designed to be tamper-resistant, ensuring security and integrity throughout the media's lifecycle. Although currently exclusive to Pixel 10, Google plans to expand this feature to other Android devices, advocating for industry-wide adoption to combat misinformation and deepfakes. Google emphasizes the need for comprehensive adoption of verifiable provenance systems to effectively address the challenges posed by AI-generated content.
Details
2025-09-10 15:52:49 thehackernews NATION STATE ACTIVITY Chinese APT Utilizes EggStreme Malware Against Philippine Military Systems
A Chinese APT group has compromised a Philippine military company using EggStreme, a sophisticated fileless malware framework, indicating ongoing geopolitical cyber tensions in the South China Sea region. EggStreme employs a multi-stage toolset that injects malicious code directly into memory, leveraging DLL sideloading for payload execution, thus maintaining a low profile. The core component, EggStremeAgent, functions as a backdoor enabling system reconnaissance, lateral movement, and data theft, utilizing a keylogger to harvest sensitive information. Communication with command-and-control servers is maintained through Google Remote Procedure Call (gRPC), supporting 58 commands for extensive system and network exploitation. The malware's resilience is enhanced by multiple C2 servers and the use of the Stowaway proxy utility, complicating detection and maintaining persistent access. The fileless nature and sophisticated execution flow of EggStreme allow it to evade detection, posing a significant threat to targeted entities. This attack highlights the advanced capabilities of state-sponsored actors in bypassing modern defensive measures and emphasizes the need for vigilant cybersecurity strategies.
Details
2025-09-10 15:52:49 bleepingcomputer VULNERABILITIES Cursor IDE Flaw Allows Malicious Code Execution Without User Consent
A vulnerability in Cursor, an AI-powered IDE, permits automatic execution of malicious tasks, posing risks to developers by enabling malware deployment and credential theft. The flaw stems from disabling the Workspace Trust feature, which prevents automatic task execution without explicit user consent, unlike its parent, Visual Studio Code. Oasis Security researchers demonstrated the risk with a proof-of-concept, showing how arbitrary code can execute when a project folder is opened in Cursor. Potential threats include data theft, unauthorized system modifications, and creating vectors for supply-chain attacks, impacting over a million Cursor users. Despite the identified risk, Cursor developers plan to retain the autorun feature, citing user preference for AI functionalities that require Workspace Trust to be disabled. Users are advised to enable Workspace Trust manually, use alternative editors for untrusted projects, and avoid globally exporting sensitive credentials. The Cursor team intends to update their security guidance, offering instructions on enabling Workspace Trust to mitigate risks.
Details
2025-09-10 15:32:14 bleepingcomputer DATA BREACH Jaguar Land Rover Faces Data Theft After Cyberattack
Jaguar Land Rover (JLR) confirmed a cyberattack led to data theft, disrupting production and instructing staff to stay home. The company, owned by Tata Motors India, generates over $38 billion in annual revenue and employs 39,000 globally. The attack severely disrupted JLR's production activities, prompting collaboration with the U.K. National Cyber Security Centre for recovery. JLR is conducting a forensic investigation and has informed relevant authorities and regulators about the data breach. A group called "Scattered Lapsus$ Hunters" claimed responsibility, linking themselves to known cybercriminal entities like Lapsus$ and ShinyHunters. The group has shared evidence of infiltrating JLR's systems and deploying ransomware, though no specific ransomware group has claimed the attack. The incident underscores the vulnerability of major manufacturers to sophisticated cyber threats and the importance of robust cybersecurity measures.
Details
2025-09-10 14:10:36 bleepingcomputer CYBERCRIME Clorox Faces $380 Million Loss from Social Engineering Attack
Attackers from the Scattered Spider group exploited human error by impersonating Clorox employees, accessing systems through repeated password and MFA resets via a third-party service desk. The breach resulted in approximately $380 million in damages, including $49 million in remedial expenses and significant business-interruption losses due to production and supply chain disruptions. The attackers conducted reconnaissance to gather internal details, using scripted calls to pressure service desk agents into bypassing security protocols without proper verification. The incident underscores the critical need for robust verification processes, especially when outsourcing help-desk functions, to prevent unauthorized access and protect sensitive systems. The Cybersecurity and Infrastructure Security Agency (CISA) and other bodies have noted similar tactics, urging organizations to strengthen caller verification as a key supply-chain control. Organizations are advised to treat help-desk resets as privileged operations, ensuring vendor-side controls, auditability, and regular social-engineering simulations to mitigate risks. The incident serves as a stark reminder of the potential financial and operational impacts of social engineering attacks, emphasizing the importance of comprehensive security measures and training.
Details
2025-09-10 13:10:29 thehackernews MALWARE New CHILLYHELL and ZynorRAT Malware Threaten Multiple Operating Systems
Cybersecurity researchers identified two new malware threats: CHILLYHELL, a macOS backdoor, and ZynorRAT, a multi-platform RAT targeting Windows and Linux systems. CHILLYHELL, developed for Intel architectures, is attributed to the threat cluster UNC4487, suspected of espionage activities against Ukrainian government entities. The malware uses sophisticated persistence methods and communicates with command-and-control servers over HTTP or DNS, allowing it to execute a wide range of commands. CHILLYHELL employs tactics like timestomping and password cracking, making it a unique threat in the macOS landscape; Apple has revoked its developer certificates. ZynorRAT, written in Go, utilizes a Telegram bot for command-and-control, enabling file exfiltration, system enumeration, and arbitrary command execution on infected systems. Evidence suggests ZynorRAT is the work of a lone actor, possibly of Turkish origin, with payloads distributed via Dosya.co, a file-sharing service. The emergence of these malware families underscores the evolving sophistication and persistence of threats across multiple operating systems, emphasizing the need for robust security measures.
Details
2025-09-10 11:38:11 theregister CYBERCRIME Ukrainian Ransomware Leader Indicted for $18 Billion in Damages
Volodymyr Tymoshchuk, a Ukrainian national, faces federal charges for leading ransomware operations causing $18 billion in global damages, with an $11 million bounty for his capture. The operations, including LockerGoga, MegaCortex, and Nefilim, targeted over 250 U.S. companies and hundreds more worldwide, severely disrupting business operations. Norsk Hydro's 2019 ransomware attack, linked to Tymoshchuk, resulted in $81 million in damages, affecting 35,000 employees across 40 countries. The U.S. Justice Department has charged Tymoshchuk with multiple counts of computer intrusion, extortion, and unauthorized access, with potential life imprisonment if convicted. The ransomware groups exploited tools like Cobalt Strike and Metasploit, often using stolen credentials to infiltrate networks undetected for months. Despite the indictment, Tymoshchuk remains at large, with international efforts underway to secure his arrest and extradition. The case underscores the persistent threat of ransomware and the importance of proactive detection and notification to thwart attacks.
Details
2025-09-10 11:23:01 thehackernews VULNERABILITIES Microsoft Releases Patches for 80 Security Flaws in October Update
Microsoft addressed 80 security vulnerabilities, including eight critical ones, in its latest software update, with no zero-day exploits reported. The October update includes 38 privilege escalation flaws, 22 remote code execution vulnerabilities, and other issues affecting Microsoft's software suite. A significant flaw, CVE-2025-55234, involves privilege escalation in Windows SMB, potentially enabling relay attacks if proper authentication measures aren't implemented. Azure Networking's CVE-2025-54914 received the highest CVSS score of 10.0, but requires no customer action due to its cloud-specific nature. The update also rectifies vulnerabilities in Microsoft Edge, Windows NTLM, and BitLocker, addressing potential risks of unauthorized access and data exfiltration. Organizations are encouraged to implement additional security measures, such as SMB signing and TPM+PIN for BitLocker, to mitigate potential threats. The disclosure of BitLockMove, a new lateral movement technique, underscores the need for robust security practices to prevent domain escalation risks.
Details
2025-09-10 10:25:40 thehackernews VULNERABILITIES Apple Introduces Memory Integrity Enforcement for Enhanced iPhone Security
Apple has unveiled Memory Integrity Enforcement (MIE) with the new iPhone 17 and iPhone Air, enhancing memory safety against spyware without compromising performance. MIE is integrated into Apple's A19 and A19 Pro chips, focusing on critical attack surfaces like the kernel and over 70 userland processes. The technology is based on Enhanced Memory Tagging Extension (EMTE), improving on Arm's 2019 Memory Tagging Extension to prevent memory corruption. MIE addresses buffer overflow and use-after-free vulnerabilities, blocking unauthorized memory access and retagging memory to prevent exploitation. Apple's Tag Confidentiality Enforcement (TCE) secures memory allocators against side-channel and speculative execution attacks, enhancing protection against known vulnerabilities. This advancement positions Apple alongside Google and Microsoft, which have also integrated similar memory safety features in their devices and operating systems. The introduction of MIE signifies a significant step in device security, potentially reducing the effectiveness of zero-day exploits.
Details
2025-09-10 10:18:51 theregister DATA BREACH Birmingham School Data Breach Exposes Students' Personal Information
A Birmingham secondary school inadvertently exposed personal data of students in Years 7 to 11, affecting hundreds of families. The breach involved a spreadsheet containing student names, genders, dates of birth, and parents' contact details, shared via email. The data was accessible through the school's intranet for nine minutes, potentially downloaded by parents who received the email. Immediate actions included contacting the management information system provider to remove and recall the message, and advising parents to delete the information. The school has apologized and is working with the Trust Data Protection Officer to investigate and prevent future incidents. Parents expressed concerns over potential risks to their children's safety due to the exposure of sensitive information. The school is cooperating with the Information Commissioner's Office (ICO) as part of the ongoing investigation.
Details
2025-09-10 09:55:58 thehackernews NATION STATE ACTIVITY APT41 Cyber Espionage Targets U.S. Trade Officials Amid Negotiations
The House Select Committee on China issued a warning about cyber espionage campaigns linked to the People's Republic of China targeting U.S. trade policy stakeholders. APT41, a group associated with China, impersonated U.S. Congressman John Robert Moolenaar in phishing emails to deceive and gain unauthorized access to sensitive information. The attacks aimed to steal data by exploiting software and cloud services, a common tactic among state-sponsored hackers to avoid detection. The phishing campaign targeted U.S. government agencies, business organizations, law firms, think tanks, and a foreign government involved in U.S.-China trade talks. The attackers used sophisticated methods, including malware-laden attachments, to gather sensitive data and establish persistent access to targeted systems. The campaign is part of a broader effort by China to influence U.S. policy and negotiation strategies, leveraging cyber operations to gain strategic advantage. The Chinese embassy in Washington refuted the allegations, emphasizing their opposition to cyber attacks and the importance of evidence-based accusations.
Details
2025-09-10 09:33:29 thehackernews MISCELLANEOUS Automation Transforms Cybersecurity Services for Managed Providers
Managed service providers face increasing pressure to deliver robust cybersecurity amidst evolving threats and compliance demands, while clients seek better protection without direct management. Many providers struggle with manual processes that hinder efficiency, delay client outcomes, and restrict growth, impacting both profitability and service quality. Automation offers a solution by streamlining repetitive tasks, enhancing consistency, and freeing resources, enabling providers to expand services and strengthen client relationships. AI-powered platforms like Cynomi's vCISO reduce cybersecurity workload significantly, cutting manual efforts by up to 70% and improving service delivery timelines. The transition to automation can dramatically reduce task completion times, enhancing scalability and operational efficiency for service providers. A practical guide outlines key areas for automation impact and provides a roadmap for integrating these technologies into cybersecurity operations. Embracing automation positions providers to scale effectively, serve more clients, and transition from technical support roles to trusted business advisors.
Details
2025-09-10 08:03:55 theregister CYBERCRIME Cyberattack Disrupts Jaguar Land Rover's Global Operations
Jaguar Land Rover experienced a major cyberattack, leading to IT system disruptions across multiple sites, affecting production and dealer operations globally. The attack, occurring on August 31, forced shutdowns at the Solihull plant, halting vehicle registration and parts supply in the UK. A group named "Scattered Lapsus$ Hunters," possibly comprising teenagers, claimed responsibility, sharing internal system screenshots on Telegram. JLR's rapid response involved shutting down IT systems to prevent further lateral movement by attackers, minimizing potential damage. The incident underscores the vulnerability of the manufacturing sector to cyber threats, similar to recent breaches affecting Clorox and Microsoft. Lessons for businesses include the need for swift response protocols, diversifying tech stacks, securing identity systems, and adopting a Zero Trust model. The attack emphasizes the importance of pre-authorized decision-making at the board level for rapid isolation and containment during cyber incidents.
Details
2025-09-10 08:03:54 thehackernews CYBERCRIME Salty2FA Phishing Kit Threatens US and EU Enterprises' Security
Researchers at ANY.RUN have identified Salty2FA, a new phishing kit targeting US and EU enterprises, capable of bypassing multiple two-factor authentication methods. Salty2FA poses a significant threat to industries such as finance, energy, and telecommunications by facilitating account takeovers through credential theft. The phishing kit employs a multi-stage execution chain, including convincing email lures and fake login pages, to intercept credentials and 2FA codes. Campaigns using Salty2FA have been active since late July 2025, with early traces potentially dating back to March, impacting numerous enterprises across regions. Security Operations Centers (SOCs) are advised to focus on behavioral patterns and response speed, as static indicators like domains or hashes change frequently. Interactive sandboxing tools, such as ANY.RUN, are recommended to enhance threat visibility and reduce investigation times, providing critical insights into evolving phishing tactics. Enterprises are encouraged to adopt these advanced defenses to transform Salty2FA from a hidden risk into a manageable threat, ensuring robust protection against phishing attacks.
Details