Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 11783
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-08-18 11:00:12 | thehackernews | VULNERABILITIES | Malicious Packages Exploit Dependency Chains in Supply Chain Attacks | Cybersecurity researchers identified malicious packages in PyPI and npm repositories, exploiting dependencies to establish persistence and execute remote code, affecting Python and JavaScript ecosystems.
The PyPI package "termncolor" and its dependency "colorinal" were downloaded hundreds of times before removal, utilizing DLL side-loading for persistence and C2 communication via Zulip.
The npm ecosystem faced similar threats, with packages designed to harvest sensitive data like iCloud Keychain and cryptocurrency wallets, employing tactics such as job assessment scams.
Threat actors leveraged legitimate services like Dropbox for data exfiltration, targeting developers with malicious proof-of-concept code and kernel patch disguises.
Automated dependency management tools, such as Dependabot, inadvertently amplified risks by merging updates without scrutiny, as seen in the eslint-config-prettier compromise.
The incidents underscore the critical need for vigilant monitoring of open-source ecosystems and careful management of automated dependency updates to mitigate supply chain risks.
Organizations are advised to enhance their supply chain security measures, including rigorous validation of dependencies and cautious use of automated tools. | Details |
| 2025-08-18 10:49:57 | theregister | VULNERABILITIES | New Tool Exposes Critical Flaws in 5G Network Security | Researchers from the Singapore University of Technology and Design introduced Sni5Gect, a tool exploiting vulnerabilities in 5G networks, at the 34th USENIX security conference.
Sni5Gect can sniff 5G traffic and perform connection downgrade attacks without rogue base stations, targeting the handshake phase between devices and networks.
The tool exploits unencrypted messaging during pre-authentication, enabling attackers to inject messages and perform surveillance with high accuracy.
Testing demonstrated over 80% accuracy in traffic sniffing and 70-90% success in packet injection, including downgrading connections from 5G to 4G.
The GSMA has acknowledged the discovery, assigning it CVD-2024-0096, and is working on addressing these vulnerabilities within the 5G standard.
Some advanced exploits remain undisclosed to prevent misuse, available only to verified institutions for research purposes.
The Sni5Gect framework is open-source under the GNU Affero General Public Licence 3, with usage restricted to research and educational purposes. | Details |
| 2025-08-18 10:19:32 | thehackernews | MISCELLANEOUS | Wazuh Platform Enhances Regulatory Compliance and Security Posture | Wazuh, an open-source security platform, integrates XDR and SIEM capabilities to aid organizations in meeting regulatory compliance standards across various sectors, including healthcare, finance, and government contracting.
The platform offers out-of-the-box modules and dashboards for compliance with PCI DSS, GDPR, HIPAA, and other frameworks, providing real-time visibility into compliance status and alert management.
Wazuh's File Integrity Monitoring and log analysis modules enable organizations to detect and manage sensitive information, enhancing their overall security posture and compliance efforts.
The Active Response module automates incident responses, allowing custom scripts to address specific threats, such as disabling user accounts after multiple failed login attempts.
Compliance events are visualized through dedicated dashboards, offering insights into alert timelines, agent-specific alerts, and compliance requirement classifications for targeted auditing and monitoring.
Regular updates to regulatory compliance documentation within Wazuh ensure that organizations stay informed of the latest standards, aiding compliance specialists and auditors in maintaining adherence.
By centralizing threat detection and compliance monitoring, Wazuh supports organizations in protecting sensitive data and meeting evolving regulatory requirements efficiently. | Details |
| 2025-08-18 10:04:30 | theregister | DATA BREACH | OpenAI Faces Scrutiny Over Data Retention and Privacy Concerns | OpenAI users found their queries unexpectedly appearing in Google searches, raising significant privacy concerns about data retention and visibility.
OpenAI had previously allowed users to make chats discoverable, potentially exposing sensitive information to public searches.
A federal court order mandates OpenAI to retain all user interactions, including those marked as deleted, due to an ongoing copyright lawsuit.
OpenAI has removed the option to make chats publicly searchable and is working to de-index existing content from search engines.
The incident emphasizes the need for users to understand data-sharing implications and the permanence of digital interactions.
Similar concerns extend to other AI platforms like Google's Gemini and Anthropic's Claude, which retain conversation data for personalization and analytics.
The situation highlights the broader risks of AI data retention policies, especially regarding sensitive and potentially damaging information. | Details |
| 2025-08-18 07:58:58 | bleepingcomputer | DATA BREACH | Workday Reports Data Breach via Compromised CRM Platform | Workday disclosed a data breach following a social engineering attack on a third-party CRM platform, affecting business contact information but not customer tenants.
The breach exposed names, email addresses, and phone numbers, potentially aiding further social engineering scams targeting affected organizations.
The incident was discovered on August 6, and Workday has notified potentially impacted customers, emphasizing no access to customer tenant data occurred.
Attackers impersonated HR or IT staff to trick employees into revealing sensitive information, using text and phone communications.
The breach is linked to a broader campaign by the ShinyHunters group, known for targeting Salesforce CRM instances through social engineering and voice phishing.
Other high-profile companies, including Google and Louis Vuitton, have also been targeted in this wave of attacks, which began earlier this year.
The attackers use malicious OAuth apps to access and steal company databases, subsequently demanding extortion payments from victims. | Details |
| 2025-08-18 06:41:02 | theregister | MALWARE | Infostealing Malware Targets Russian Crypto Developers via NPM Packages | Researchers at Safety identified malicious npm packages targeting Russian cryptocurrency developers, potentially linked to state-sponsored ransomware groups.
The malware, disguised as legitimate Solana SDK components, aims to steal cryptocurrency tokens and sensitive data from developers.
The threat actor, using the name "cryptohan," exploits the npm Registry to distribute infostealers under the guise of credibility.
Data extracted by the malware is sent to command and control servers with IP addresses associated with the USA.
Victims appear to be primarily located in Russia, raising suspicions of geopolitical motivations behind the attack.
The incident underscores the need for developers to secure their software supply chains against such threats.
Safety offers assistance to developers in sanitizing their software ecosystems to prevent further exploitation. | Details |
| 2025-08-17 23:07:23 | theregister | CYBERCRIME | New York State Sues Zelle Over Rampant Payment Fraud Allegations | New York Attorney General filed a lawsuit against Zelle's operator, Early Warning Services, accusing it of enabling widespread fraud affecting users between 2017 and 2023.
Zelle, a peer-to-peer payment service, reportedly lacked critical security features, allowing scammers to exploit the platform and steal over $1 billion.
The lawsuit claims Zelle's design flaws included inadequate verification steps, facilitating fraudulent account creation mimicking legitimate brands.
Victims of fraud on Zelle faced significant challenges in recovering stolen funds due to the platform's rapid payment processing and lack of effective restitution mechanisms.
Despite developing safeguards, Zelle allegedly failed to implement them, resulting in continued exploitation by fraudsters.
The lawsuit seeks monetary restitution for New York residents affected by the fraud, stressing the need for stronger security measures in financial platforms. | Details |
| 2025-08-17 14:45:21 | bleepingcomputer | CYBERCRIME | U.S. DoJ Seizes $2.8 Million from Zeppelin Ransomware Operator | The U.S. Department of Justice seized over $2.8 million in cryptocurrency from Ianis Aleksandrovich Antropenko, linked to the Zeppelin ransomware operation.
Antropenko, indicted for computer fraud and money laundering, targeted global entities, including U.S. businesses, with Zeppelin ransomware from 2019 to 2022.
Alongside digital assets, authorities confiscated $70,000 in cash and a luxury vehicle, showcasing the financial scale of the operation.
Zeppelin ransomware, a VegaLocker/Buran variant, exploited MSP software flaws, particularly affecting healthcare and IT sectors.
Antropenko attempted to launder ransom proceeds through services like ChipMixer and crypto-to-cash exchanges, complicating tracking efforts.
Despite Zeppelin's defunct status since 2022, security researchers had decryption keys since early 2020, aiding victims in data recovery.
Recent seizures, including from BlackSuit and Chaos ransomware, highlight ongoing efforts to disrupt financial gains from cybercrime activities. | Details |
| 2025-08-16 16:25:18 | theregister | MISCELLANEOUS | Concerns Rise Over Election Security Amid Federal Support Cuts | Election officials express rising concerns over threats and intimidation, fearing reduced federal support as the 2026 election approaches, potentially impacting both physical and digital security measures.
Bill Gates, an Arizona election official, recounts past threats and harassment, emphasizing the importance of federal support from agencies like CISA in maintaining election security.
The Brennan Center survey reveals 61% of election officials are worried about CISA budget cuts affecting election security, with 80% advocating for sustained federal support.
Natalie Adona, a California election official, highlights the critical role CISA played in providing low-cost tools and support, which is now uncertain due to staffing and budget reductions.
Tina Barton, a senior election expert, stresses the importance of collaborative planning and information sharing, which is jeopardized by the shutdown of key security centers like EI-ISAC.
The potential lack of federal resources raises concerns about local election offices' ability to combat cyber threats from state actors, as smaller communities face challenges in defending against sophisticated attacks.
Organizations like The Elections Group are stepping in to bridge the gap, aiming to ensure democracy is protected from misinformation and malicious activities in the upcoming election cycle. | Details |
| 2025-08-16 14:28:33 | bleepingcomputer | VULNERABILITIES | Fortinet Addresses Critical Authentication Bypass in FortiWeb Firewall | A critical vulnerability in FortiWeb, tracked as CVE-2025-52970, allows remote attackers to bypass authentication, posing a significant risk to affected systems.
The flaw, named FortMajeure, involves an out-of-bounds read in cookie parsing, enabling attackers to forge authentication cookies and impersonate users, including administrators.
Exploitation requires an active session and brute-forcing a small numeric field, with a search space of approximately 30 requests, simplifying the attack process.
Fortinet released a patch on August 12, addressing the issue in versions 7.0 to 7.6; FortiWeb 8.0 versions are unaffected.
The vulnerability’s CVSS score of 7.7 may be misleading due to the perceived complexity, though practical exploitation is straightforward and rapid.
Security researcher Aviv Y plans to release full exploit details later, allowing administrators time to apply necessary updates and mitigate risks.
Immediate patching is crucial as attackers are likely to exploit this vulnerability swiftly once full proof-of-concept details are available. | Details |
| 2025-08-16 14:20:34 | bleepingcomputer | VULNERABILITIES | Microsoft Teams Enhances Security Against Malicious URLs and File Types | Microsoft is enhancing Teams with features to block weaponizable file types and detect malicious URLs, aiming to reduce malware and file-based attack risks in chats and channels.
The new security measures are in development and will be rolled out globally to Microsoft 365 multi-tenants starting next month, enhancing overall platform security.
Teams now integrates with Microsoft Defender for Office 365, allowing security admins to block or delete communications from blocked domains, improving threat management capabilities.
A new Prevent Screen Capture feature, introduced in July 2025, protects sensitive information by disabling screen captures during meetings, addressing unauthorized data capture concerns.
Microsoft’s Chat brand impersonation protection, targeting phishing attacks, will be available to all users by February 2025, bolstering defenses against external threats.
With over 320 million active users, these updates aim to maintain Teams' security integrity across 181 markets and 44 languages, safeguarding a vast global user base. | Details |
| 2025-08-16 10:43:58 | thehackernews | MALWARE | ERMAC 3.0 Banking Trojan Source Code Leak Reveals Infrastructure Flaws | Researchers have analyzed the ERMAC 3.0 Android banking trojan, uncovering significant vulnerabilities in its infrastructure, which could aid cybersecurity defenses.
ERMAC 3.0 expands its malicious capabilities, targeting over 700 banking, shopping, and cryptocurrency applications worldwide, posing a broad threat landscape.
The trojan's evolution traces back to Cerberus and BlackRock, sharing lineage with other malware families like Hook, Pegasus, and Loot.
Hunt.io accessed the complete source code from an open directory, revealing its backend, frontend, exfiltration server, and Android builder panel.
New features in ERMAC 3.0 include advanced form injection methods, an upgraded C2 panel, a new Android backdoor, and encrypted communications.
Identified weaknesses include hardcoded JWT secrets, static admin tokens, and default credentials, which could be exploited to disrupt operations.
The exposure of these vulnerabilities offers defenders actionable insights to track and mitigate ERMAC-related threats effectively. | Details |
| 2025-08-16 05:39:50 | thehackernews | MALWARE | EncryptHub Exploits MSC EvilTwin Flaw to Deploy Fickle Stealer | EncryptHub, a Russian hacking group, is exploiting a patched Microsoft Management Console vulnerability (CVE-2025-26633) to deploy Fickle Stealer malware via social engineering tactics.
The group uses fake IT department communications through Microsoft Teams to initiate remote connections, deploying payloads with PowerShell commands and malicious MSC files.
Attackers utilize a Go-based loader, SilentCrystal, leveraging unauthorized access to Brave Support to host malware, indicating sophisticated account compromise capabilities.
Tactics also include videoconferencing lures with phony platforms like RivaTalk, delivering malware through MSI installers and sideloading malicious DLLs.
The malware gathers and exfiltrates system information, maintains persistence, and uses encrypted PowerShell commands to control infected systems.
EncryptHub's adaptive strategies involve blending C2 communications with normal traffic, highlighting the need for robust defense mechanisms and user awareness.
Organizations are advised to strengthen layered defense strategies and maintain updated threat intelligence to counteract such evolving threats. | Details |
| 2025-08-15 21:51:25 | theregister | NATION STATE ACTIVITY | Chinese APT Group UAT-7237 Targets Taiwanese Web Host for Espionage | Cisco Talos reports that UAT-7237, a Chinese-speaking APT group, infiltrated a Taiwanese web hosting provider, stealing credentials and installing backdoors for sustained access.
The group, linked to broader Chinese APT activities, utilizes a mix of open-source and custom tools, including Cobalt Strike and the SoftEther VPN client for persistent access.
UAT-7237 focuses on exploiting known vulnerabilities in unpatched servers to gain initial access, followed by reconnaissance to identify valuable targets.
Post-compromise, the group employs tools like JuicyPotato and Mimikatz for privilege escalation and credential theft, alongside custom malware such as SoundBill.
The attack strategy includes adjusting system configurations to facilitate malicious activities and storing credentials in cleartext.
Talos has published indicators of compromise on GitHub to aid organizations in detecting and mitigating threats from UAT-7237.
The group's activities underscore the importance of patch management and vigilance against sophisticated nation-state cyber threats. | Details |
| 2025-08-15 17:40:06 | theregister | VULNERABILITIES | Critical CVSS 10 Vulnerability Discovered in Cisco Firewall Management | Cisco patched a critical vulnerability in its Secure Firewall Management Center, identified as CVE-2025-20265, which could allow remote command injection by unauthenticated attackers.
The flaw, rated a perfect 10.0 on the CVSS scale, stems from improper input handling in the RADIUS authentication subsystem during login processes.
Exploitation requires the Firewall Management Center to be configured with RADIUS authentication for web or SSH management interfaces.
Cisco's centralized management platform is widely used by enterprises, government agencies, and educational institutions, making this vulnerability a significant concern.
No active exploitation of this vulnerability has been reported, but the potential for abuse remains, especially by state-sponsored actors known to target Cisco products.
This vulnerability follows a series of maximum-severity flaws in Cisco products, prompting urgent patching across affected systems.
Cisco's internal security testing identified the flaw, emphasizing the importance of proactive vulnerability management and timely patch deployment. | Details |