Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 11798
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-07-31 13:51:42 | thehackernews | NATION STATE ACTIVITY | North Korean Hackers Target Crypto Firms Via Social Engineering | North Korea-linked UNC4899 engaged in sophisticated cryptocurrency theft targeting multiple organizations through social engineering via LinkedIn and Telegram.
The attackers employed malicious Docker containers and npm packages to infiltrate systems, leveraging job offers and collaborative project lures on platforms like GitHub.
UNC4899, also known as Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor, has been active since 2020 and is associated with significant crypto heists.
The group exploited cloud environments such as Google Cloud and AWS, using malware like GLASSCANNON, PLOTTWIST, and MAZEWIRE to establish remote connections and perform actions like credential theft.
In one instance, malicious actors disabled and later reinstated MFA to maintain access without detection.
The operations concluded with the threat actors successfully extracting millions in cryptocurrency by manipulating CloudFront and S3 configurations.
Google's intervention highlighted the use of stolen credentials and session cookies in the attacks, which prevented further unauthorized activities due to multi-factor authentication (MFA) barriers.
The activity forms part of a broader strategy by North Korea's Lazarus Group, which has escalated inserting malware into npm and PyPI open source registries. | Details |
| 2025-07-31 13:36:52 | theregister | MISCELLANEOUS | UK Regulator Proposes Measures Against Microsoft and AWS | Britain's competition watchdog, after a 21-month investigation, suggests Microsoft and AWS hold too much market power in the UK cloud sector.
The Competition and Markets Authority (CMA) intends to grant Microsoft and AWS strategic market status (SMS), allowing for targeted regulatory measures.
Microsoft and AWS, controlling 30-40% of the UK's cloud market, could face actions due to their significant unilateral market power and high profit margins.
The report highlights issues such as overpricing, technical barriers, and restrictive licensing, which stifle competition and innovation.
Google, although a smaller player in the UK cloud market with 5-10% share, escapes similar scrutiny, differing markedly from Microsoft and AWS.
The CMA suggests that increased competition could lead to better pricing, potentially saving UK businesses around £500 million annually.
AWS and Microsoft disagree with the findings, arguing the report overlooks the dynamic nature of the cloud market and the competition within it.
Final recommendations and decisions from the Digital Markets Unit (DMU) are expected by early 2026, with ongoing evaluations influenced by international regulatory actions. | Details |
| 2025-07-31 13:02:39 | bleepingcomputer | CYBERCRIME | Study Links Pre-Disclosure Malicious Activity to 80% of New CVEs | Researchers from GreyNoise have documented a correlation between spikes in malicious network activity and the disclosure of new security vulnerabilities, affecting 80% of CVEs within six weeks.
Data analysis from GreyNoise's Global Observation Grid indicates these patterns are statistically significant and repeatable across major enterprise edge vendors such as Ivanti, SonicWall, and Palo Alto Networks.
The study identified that half of these malicious spike events precede the announcement of a new CVE by three weeks, with a stronger correlation found in specific vendors.
The majority of early attack efforts target older vulnerabilities, which may aid attackers in discovering new security flaws or vulnerable internet-exposed endpoints.
GreyNoise advises organizations to enhance monitoring and defensive measures upon detecting suspicious scanning activities, even before CVEs are formally published.
Google’s Project Zero aims to shorten the “patch gap” by announcing discovered vulnerabilities within a week to assist system administrators in preemptive defense strategies. | Details |
| 2025-07-31 12:35:02 | theregister | CYBERCRIME | Major NHS Supplier Near Collapse Following Cyberattack Impact | NRS Healthcare, a key provider of disability equipment to the NHS and local councils in the UK, is facing potential compulsory liquidation 16 months post-cyberattack.
The company, instrumental for delivering urgent healthcare equipment, has initiated the transfer of its services to other providers, aiming to preserve jobs and service continuity.
Fiscal reports revealed that although the cyberattack (claimed by RansomHub) had minimal immediate fiscal impact, significant financial strain manifested in the following year, complicating recovery efforts.
In response to the cyber incident, NRS Healthcare expedited a digital transformation project, completing it in three weeks instead of six months, which included major updates to cybersecurity standards.
Increasing financial pressures have led to unsuccessful attempts by NRS Healthcare to secure a buyer through PricewaterhouseCoopers, pushing the company towards liquidation.
Local councils have expressed concerns about meeting statutory service obligations if NRS Healthcare collapses, highlighting the urgent requirement for same-day service provisions for hospital leavers.
The DHSC is actively coordinating with multiple partners to mitigate potential service disruptions and is considering requests from local councils for financial support during the transition. | Details |
| 2025-07-31 11:26:24 | thehackernews | MISCELLANEOUS | SentinelOne Leads in AI-Driven Endpoint Security, Gartner Reports | Gartner has named SentinelOne a leader in the 2025 Magic Quadrant for Endpoint Protection Platforms for the fifth consecutive year.
SentinelOne's Singularity Platform utilizes AI and machine learning to offer advanced cybersecurity across all devices and operating systems.
The platform integrates EDR, CNAPP, Hyperautomation, and AI SIEM, and is authorized at FedRAMP High, ensuring top-level U.S. federal cloud security.
SentinelOne's innovations in AI-driven security allow faster detection and response times, reducing manual triage and integrating seamlessly with existing tools.
The platform's capabilities are crucial for sectors like healthcare and finance where rapid response can prevent significant regulatory penalties or breaches.
SentinelOne provides a single-agent, single-console solution, simplifying deployment and management while maximizing operational continuity.
Customer feedback highlights significant improvements with a 338% ROI over three years and major reductions in incident response times during critical threats.
The company's enduring commitment to AI and automation has transformed SOC operations and set new standards in endpoint security resilience and effectiveness. | Details |
| 2025-07-31 10:25:06 | thehackernews | CYBERCRIME | Cybercriminals Hack ATMs Using Raspberry Pi and 4G Modem | UNC2891, a financially motivated threat actor, used a Raspberry Pi with a 4G connection to breach ATM networks and perform unauthorized transactions.
The Raspberry Pi was discreetly connected to the bank's network, allowing the cybercriminals to bypass traditional security measures such as perimeter firewalls.
The attackers employed TINYSHELL, a backdoor for establishing a command-and-control channel, and CAKETAP, a rootkit designed to manipulate ATM transactions and hide malicious activities.
The group has been associated with previous attacks targeting ATM infrastructure, indicating extensive knowledge of Linux and Unix-based systems.
Group-IB identified additional backdoors on the network monitoring server, which maintained persistent access even after the initial breach hardware was removed.
The attack was ultimately disrupted before significant financial damage could occur, although the attackers maintained access through compromised internal systems.
This incident underscores the growing trend of cyber-physical attacks and the potential dangers of devices with remote access capabilities within sensitive financial environments. | Details |
| 2025-07-31 10:00:12 | thehackernews | MISCELLANEOUS | Overcoming SIEM Limitations in Modern Security Operations | Security Operations Centers (SOCs) face increasing challenges with rising log volumes, complex threats, and staff shortages.
Traditional SIEMs struggle with the massive influx of data, leading to bottlenecks, especially in cloud and OT environments.
Many SOCs report significant time wasted on false positive alerts due to the inability of SIEMs to provide sufficient context for security events.
Transitioning to SaaS-based SIEMs does not always solve these issues and introduces new problems such as increased costs during high data events and compliance concerns.
Modern detection alternatives focus on metadata and behavioral analysis rather than raw log data, reducing false positives and focusing alerts.
Newer Network Detection & Response (NDR) platforms cater to modern hybrid IT and OT environments by utilizing adaptive machine learning.
A shift to modular, scalable SOC architectures incorporating behavior analytics and decentralized logging is necessary for effective modern cybersecurity management.
Emphasizing intelligent data use and automated processes in SIEM-independent platforms can enhance security operations and reduce analyst fatigue. | Details |
| 2025-07-31 10:00:12 | bleepingcomputer | MISCELLANEOUS | Proton Launches Free Privacy-Focused Authenticator App | Proton has introduced a new two-factor authentication app, Proton Authenticator, available for multiple platforms including Windows, macOS, Linux, Android, and iOS.
The app generates time-based one-time passwords (TOTPs) that enhance security by expiring every 30 seconds, avoiding common security issues like phishing or SIM swapping.
Proton Authenticator is designed to be privacy-centric, free of ads, trackers, and does not enforce vendor lock-in or require a Proton account to use.
Unlike many competitors, Proton's solution is open-source, though the source code release is pending a few weeks post-launch.
The application supports secure syncing across devices and allows for easy migration through import and export functions – a feature not available in many other popular 2FA apps.
Features of the app include automatic encrypted backups and additional security measures such as biometric or PIN app locking.
This initiative aligns with Proton's commitment to privacy and security, distinguishing itself from other tech giants' 2FA solutions that integrate with broader surveillance ecosystems.
The Authenticator app positions itself as a more secure alternative to 2FA methods that rely on SMS or email, which are vulnerable to several types of cyber threats. | Details |
| 2025-07-31 08:36:22 | theregister | MISCELLANEOUS | Challenges and Implications of the UK's Proposed VPN Ban | The UK's Online Safety Act (OSA) has prompted a significant increase in VPN usage, with companies reporting a 1,400% rise in sign-ups, as younger users seek ways to bypass new age verification systems.
Experts argue that a complete ban on VPNs, as considered by the government, is unenforceable and unrealistic, likening it to banning smoking in private homes.
Such a ban could push VPN usage underground, creating a black market, and force ISPs to block legitimate encrypted traffic, which could potentially regulate an entire industry out of existence.
The UK's largest mobile network operator, EE, has launched SIM cards for under-18s blocking access to inappropriate content, despite already offering parental controls.
Other methods of controlling VPN usage, such as traffic pattern analysis, are deemed expensive and impractical, with many VPNs capable of disguising their traffic as regular HTTPS.
Banning VPNs could negatively impact legitimate uses such as enhancing privacy on public networks, with a substantial number of UK citizens using VPNs for personal security.
Countries that currently ban VPNs include authoritarian regimes like Russia and China, putting the UK's proposal in a controversial light.
There is a strong public backlash against the OSA, evidenced by over 423,000 signatures on a digital petition demanding a repeal, which will trigger a Parliamentary debate. | Details |
| 2025-07-31 06:57:01 | thehackernews | MALWARE | Critical WordPress Theme Vulnerability Leads to Site Takeovers | A critical vulnerability in the "Alone – Charity Multipurpose Non-profit WordPress Theme" identified as CVE-2025-5394, enables hackers to remotely install plugins and execute code.
Security researcher Thái An discovered the flaw, which affects all theme versions up to 7.8.3.
The exploit allows unauthorized users to upload arbitrary files through AJAX, achieving remote code execution for full site control.
Attackers exploited the vulnerability starting July 12, 2025, two days prior to its public disclosure, suggesting pre-emptive monitoring by cybercriminals.
Wordfence has recorded over 120,900 attempts to exploit this vulnerability, primarily using backdoors and rogue admin accounts.
To safeguard against attacks, WordPress site owners should update to the latest theme version, monitor for unusual admin activity, and review relevant server logs.
Common files uploaded during these attacks include "wp-classic-editor.zip" and "background-image-cropper.zip," which contain malicious PHP scripts. | Details |
| 2025-07-31 06:34:01 | theregister | MISCELLANEOUS | Enhancing Global Internet Stability Through Improved IXP Oversight | Flavio Luciani, CTO of Namex, emphasizes the critical role of Internet Exchange Points (IXPs) in global internet infrastructure.
IXPs facilitate network traffic exchange, reduce latency, lower costs, and enhance connectivity reliability by allowing direct peering among networks.
The collective capacity of the 1,519 active IXPs is over 2 million Gbps, demonstrating their scale and the extent of their impact on global data flow.
Despite their importance, IXPs often lack visibility in public and policy discourse, are excluded from national critical infrastructure protections, and may suffer from governance and security weaknesses.
Luciani cites instances where robust IXP networks have mitigated the impact of major internet outages, contrasting with areas with weaker IXP presence that experienced severe disruptions.
He proposes the establishment of an IXP Resilience Observatory in Europe and a coordinated incident response framework to enhance IXP governance and operational transparency.
Luciani advocates for the inclusion of IXPs in national and regional cybersecurity and resilience strategies to ensure future-proof and decentralized internet infrastructure. | Details |
| 2025-07-31 02:34:02 | theregister | NATION STATE ACTIVITY | Cyber-Scams Escalate Thai-Cambodian Border Conflict | Tensions between Thailand and Cambodia escalated into a deadly clash near a disputed border area, resulting in over 30 fatalities and the evacuation of tens of thousands.
The conflict has historical roots but was intensified by issues linked to cyber-scam operations purportedly involved in human rights abuses and located near the border.
Cambodian camps accused of enslaving workers in cyber-scam activities reportedly generate significant revenue, supposedly up to half of Cambodia's GDP, with possible governmental collusion.
Thailand threatened to sever utilities to Cambodia to disrupt these scam operations, aligning with its broader foreign policy goals and contributing to heightened tensions.
International bodies and other nations, including China, have taken note and intervened, aiming to dismantle these scam networks and rescue affected individuals.
Allegations of Cambodian governmental involvement in profiteering from these cyber-scam camps are under investigation.
Global human rights groups and the United Nations are raising alarms about the inhumane conditions in the scam camps, influencing international diplomatic relations. | Details |
| 2025-07-31 00:16:48 | theregister | MISCELLANEOUS | Debates Intensify Over Airport Facial Recognition Usage | The TSA has implemented facial recognition technology in 250 US airports since 2017 to improve security and boarding processes.
Despite technological accuracy, many passengers are uncomfortable with facial recognition, and the opt-out process isn't widely disclosed or facilitated by airport personnel.
The Algorithmic Justice League reported that over two-thirds of passengers opting out receive negative treatment from airport staff.
Recent studies reveal that over 60% of travelers fear their facial data might be misused by third parties, and 74% were uninformed about the technology's deployment.
A bipartisan group of senators is pushing the Traveler Privacy Protection Act to preserve travelers' rights to opt out of facial scanning and to protect their data.
Critics, including the Security Industry Association, argue that restricting facial recognition technology could undermine national security and hinder technological advancements in airport operations.
TSA claims that the captured facial images are not stored except in specific testing scenarios aimed at evaluating tech efficacy.
The ongoing legislative debates highlight profound concerns about privacy, efficacy, and the ethical implications of biometric surveillance at airports. | Details |
| 2025-07-30 20:01:36 | bleepingcomputer | DATA BREACH | ShinyHunters Linked to Multiple High-Profile CRM Data Breaches | ShinyHunters, identified as UNC6040, orchestrated data theft from Salesforce CRM used by companies like Qantas, Allianz Life, and LVMH.
The group utilized voice phishing attacks, impersonating IT support to trick employees into providing access via a malicious OAuth app.
Google's Threat Intelligence Group reported these social engineering attacks targeting Salesforce customers using email and voice phishing.
High-profile breaches involved third-party CRM systems, with unauthorized accesses reported at Adidas, Qantas, and subsidiaries of LVMH.
Affected companies have not confirmed Salesforce as the compromised platform, but evidence implies its involvement.
ShinyHunters attempted to extort affected companies privately; however, they may leak stolen data if these attempts fail.
Confusion exists within the cybersecurity community regarding the overlap of tactics and members between ShinyHunters and other hacking groups such as Scattered Spider.
Salesforce has emphasized the importance of customer vigilance and adherence to security best practices to mitigate such attacks. | Details |
| 2025-07-30 19:01:21 | bleepingcomputer | CYBERCRIME | Python Developers Targeted by Phishing Attacks Via Fake PyPI Site | The Python Software Foundation alerts to phishing attacks aimed at Python developers using a counterfeit Python Package Index (PyPI) site.
The phishing scheme involves emails purportedly from PyPI, asking users to verify their email addresses on a fraudulent website that mimics the legitimate PyPI portal.
The attackers attempt to harvest credentials by misleading users into logging into the fake site, potentially compromising their accounts.
The credentials stolen during these phishing attacks could be used to introduce malware into Python packages or to distribute malicious software on the platform.
PyPI administrators have responded by adding a warning banner on the official site and are coordinating efforts with CDN providers and name registrars to shut down the phishing operation.
Python Software Foundation advises developers who might have divulged their credentials to change their passwords and review their security history for any unusual activities.
Recent related challenges include a temporary suspension of new user registrations and project creations in March 2024, following a malware campaign linked to uploaded malicious packages. | Details |