Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11809

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-07-14 05:33:54 thehackernews MALWARE Critical eSIM Flaw Risks Billions of IoT Devices Worldwide
Cybersecurity researchers discovered a significant vulnerability in Kigen's eUICC cards used in modern IoT devices and smartphones. The flaw exploits eSIM technology, allowing potential malicious installation and manipulation of mobile subscriptions. Over two billion devices worldwide are at risk due to this vulnerability in older eSIM technology versions. Kigen acknowledged the vulnerability, which can be abused if attackers gain physical access and use specific publicly known keys. The attack could enable downloading and tampering of mobile operator profiles, which poses risks to data integrity and security. The issue was identified and reported by Security Explorations, leading to a $30,000 bounty from Kigen. Updated GSMA TS.48 version 7.0 addresses the vulnerability, but prior versions remain deprecated. The exploitation of this vulnerability is feasible and poses a realistic threat, especially from capable nation-state actors.
Details
2025-07-14 05:20:19 theregister MISCELLANEOUS Iran Seeks Global Cloud Providers for Government Services
Iran is actively searching for a minimum of three cloud service providers to support government operations. The Information Technology Organization of Iran (ITOI) intends to evaluate and rank cloud providers based on their ability to meet specific standards. Compliance with ISO 27017 and ISO 27018, which ensure secure cloud computing and the protection of personally identifiable information, is required. Providers must also adhere to the NIST SP 800-145 definition of cloud computing, despite Iran's adversarial relationship with the USA. Cloud services sought include various forms such as IaaS, PaaS, SaaS, and options for private, public, hybrid, or community clouds. Approved organizations will receive a “cloud service rating certificate” and be listed as authorized cloud service providers. Companies involved in security, monitoring, support services, or cloud migration are also encouraged to apply. International businesses should note that many jurisdictions consider trading with Iran illegal, potentially complicating participation.
Details
2025-07-13 23:48:10 theregister MISCELLANEOUS Nvidia Issues Rowhammer Warnings; Multiple Security Incidents Reported
Nvidia has issued an advisory for its GPUs, notably the A6000, vulnerable to Rowhammer attacks which disrupt memory through electrical interference. The security loophole in Bluetooth systems has put vehicles from Mercedes-Benz, Volkswagen, and Skoda at risk, allowing potential control over various car functions. Jack Dorsey's new Bluetooth-based communication network, BitChat, has faced criticism for significant security flaws, including basic errors in authentication systems. A series of deepfake attacks impersonating US Secretary of State Marco Rubio via voicemails and texts have targeted government and foreign officials. In a major action against cybercrime, Romanian police arrested 13 individuals engaged in a scam to fraudulently claim tax benefits and relief from the UK's Revenue and Customs. Bitcoin Depot, the operator of the world's largest Bitcoin ATM network, acknowledged a data breach affecting personal information of approximately 27,000 users, delayed by a federal investigation.
Details
2025-07-13 14:42:00 bleepingcomputer CYBERCRIME Exploiting Google Gemini for Phishing Without Links or Attachments
Google Gemini for Workspace can be manipulated to generate email summaries that include hidden phishing directives. Attackers use HTML and CSS to embed invisible instructions in emails, which Gemini then processes into misleading summaries. This vulnerability was highlighted by Mozilla's GenAI Bug Bounty Programs Manager via its platform, 0din. Despite previous reporting of similar prompt injection attacks and implemented safeguards, the technique remains effectively exploitable. The misleading summaries generated by Gemini can include fake security warnings, leading to high risks of user deception. Proposed mitigation strategies include eliminating hidden text and implementing a post-process review to flag potential phishing summaries. Google has been made aware and is reportedly enhancing its defenses, although some measures are still pending deployment. No real-world exploitation of this vulnerability has been reported according to Google, but the potential for abuse remains a concern.
Details
2025-07-13 11:12:34 theregister NATION STATE ACTIVITY North Korean IT Worker Scams Target Global Companies
North Korean fake IT worker scams are infiltrating Fortune 500 companies, impersonating applicants with fabricated resumes and deepfake technologies. These scammers often use insider access to steal sensitive data and threaten companies with data leaks for ransom, with the scams causing substantial financial losses. Companies have observed a significant influx of applicants for remote jobs, particularly in engineering and software development, with discrepancies like minimal LinkedIn connections despite robust resumes. Security measures being adopted include thorough ID verifications, requiring physical presence for final hiring phases, and collaborating with law enforcement and security agencies to share intelligence and strategies. Despite sophisticated detection methods, including AI tools integrating indicators of compromise (IOCs), fraudsters continually evolve their tactics, requiring ongoing vigilance and adaptation from corporate HR and security teams. Organizations share strategies and implement strict verification processes during hiring to avoid falling victim to these employment scams, with measures like in-person onboarding being crucial. The threat, while currently attributed primarily to North Korean groups, is expected to spread as other bad actors recognize the potential for exploitation.
Details
2025-07-12 17:20:15 thehackernews MALWARE GPUHammer Compromises AI Accuracy on NVIDIA GPUs
NVIDIA urges customers to enable ECC to counteract the GPUHammer RowHammer attack variant affecting its GPUs. GPUHammer enables malicious users to induce bit flips in NVIDIA's GPU memory, specifically targeting the A6000 model with GDDR6 Memory. The University of Toronto researchers highlighted that GPUHammer attacks can reduce the accuracy of AI models from 80% to less than 1%. Unlike speculative execution vulnerabilities in CPUs, RowHammer attacks target the physical behavior of DRAM, causing disruptive bit flips. A recently developed proof-of-concept by researchers used a single-bit flip to degrade ImageNet DNN model accuracy dramatically—from 80% to 0.1%. NVIDIA recommends enabling system-level ECC, despite a potential reduction in performance and memory capacity for A6000 GPUs. Newer GPU models such as H100 and RTX 5090 are naturally resistant to GPUHammer due to onboard ECC capabilities. Academic studies reveal potential for broader implications of RowHammer on cloud platforms and AI systems, emphasizing the need for proactive security measures on GPUs.
Details
2025-07-12 15:36:04 bleepingcomputer DATA BREACH McDonald’s Job Application Chatbot Exposed 64 Million Applications
Cybersecurity researchers uncovered a security flaw in McDonald's McHire chatbot that exposed chats from over 64 million job applications. The vulnerability was found by researchers Ian Carroll and Sam Curry, revealing that admin panel credentials were as weak as "123456". The job application bot, named Olivia, accepted sensitive personal information from applicants which was inadvertently exposed due to the flaw. Researchers used a technique involving the manipulation of the lead_id parameter in HTTP requests to access other applicants' data without authorization. This vulnerability represents an IDOR (Insecure Direct Object Reference) issue, where internal identifiers like record numbers are exposed. McDonald's and its service provider Paradox.ai responded swiftly, with a fix deployed the same day the issue was reported, and default admin credentials disabled. Paradox.ai is conducting an ongoing review and has made updates to ensure similar vulnerabilities are not repeated. Paradox clarified that any interaction with the chatbot could have been exposed, not necessarily those including personal data submissions.
Details
2025-07-12 14:19:01 bleepingcomputer MALWARE Critical RCE Vulnerability Exploited in Wing FTP Server
Hackers initiated attacks exploiting a severe remote code execution flaw in Wing FTP Server, identified as CVE-2025-47812. The vulnerability allows unauthenticated remote attackers to run high-privilege code due to unsafe string handling in C++ and unsanitized Lua input. Threat actors ran enumeration and reconnaissance tactics, aimed to establish persistence by creating new user accounts. A security update (version 7.4.4) that fixes this RCE flaw has been issued by the vendor, with recommendations to upgrade immediately. The researcher's demonstration showed exploitation via a null byte in the username field, leading to arbitrary Lua code injection. Managed cybersecurity service Huntress observed real-time attacks involving malformed login attempts and sessions designed to download and execute malicious payloads. Organization recommendations include upgrading Wing FTP software, restricting web access, disabling anonymous logins, and monitoring session directories.
Details
2025-07-12 12:53:47 thehackernews CYBERCRIME Over 600 Laravel Apps at Risk Due to Leaked Encryption Keys
Cybersecurity researchers at GitGuardian, in collaboration with Synacktiv, uncovered remote code execution vulnerabilities in over 600 Laravel applications caused by leaked APP_KEYs on GitHub. More than 260,000 APP_KEYs were extracted from GitHub data spanning from 2018 to May 2025, with 400 confirmed functional out of over 10,000 unique keys found. The vulnerability exploits a deserialization flaw through Laravel's decrypt() function, allowing attackers to execute arbitrary code using the leaked APP_KEY. This security issue persists in newer Laravel versions under certain configurations, despite being initially documented with CVE-2018-15133. The research found that 63% of these APP_KEY leaks are due to misconfigurations in .env files, which often contain other sensitive information like database credentials and cloud storage tokens. Approximately 28,000 exposed APP_KEY and APP_URL pairs were found on GitHub, with about 10% validating as active and compromising the application's security directly. GitGuardian emphasized the necessity for a robust rotation and secret monitoring strategy to effectively manage and secure exposed keys. The broader security context includes persistent risks across PHP environments, highlighting the need for comprehensive secret management and preventative measures in software development practices.
Details
2025-07-12 07:51:15 bleepingcomputer CYBERCRIME NVIDIA Advises on Protecting GDDR6 GPUs from Rowhammer Attacks
NVIDIA is urging users to enable System Level Error-Correcting Code (ECC) to mitigate Rowhammer attacks on GPUs with GDDR6 memory. Recent research demonstrated a successful Rowhammer attack on an NVIDIA A6000 GPU, prompting NVIDIA's recommendation. Rowhammer is a hardware fault exploited through frequent memory access, causing data corruption or system disruptions by altering adjacent memory bits. System Level ECC adds redundant bits to data, correcting single-bit errors and ensuring data integrity and reliability in critical applications. The attacks are technically challenging due to GDDR6’s higher latency and faster refresh rates compared to traditional DDR4, but they remain feasible. NVIDIA recommends System Level ECC for several GPU models, including latest data center and workstation units, to protect against potential vulnerabilities. Newer GPUs like the Blackwell and Hopper series feature built-in on-die ECC, which provides automatic protection without user intervention. Users can verify the ECC status via out-of-band and in-band methods, including system tools and command-line utilities like nvidia-smi.
Details
2025-07-11 21:33:30 bleepingcomputer DATA BREACH Vulnerability Exposes Chat Data of 64 Million McDonald’s Applicants
Cybersecurity researchers found a serious flaw in McDonald's job application chatbot, resulting in exposure of personal information for over 64 million applicants. Weak default credentials "123456" on McHire's admin panel allowed unauthorized access to applicant data. Researchers utilized an IDOR vulnerability to increment or decrement unique applicant IDs, accessing sensitive data like chat transcripts and personal details. The vulnerability, found in the McHire system powered by Paradox.ai, was quickly addressed by McDonald's and Paradox after being reported. McDonald's implemented immediate changes by disabling the default admin credentials and pressing Paradox.ai to fix the IDOR flaw on the same day it was reported. Paradox.ai has committed to a system review to prevent further vulnerabilities and ensure the security of applicant data. Despite the prompt response, the incident highlights continued risks in cloud security and the effectiveness of simple exploit techniques.
Details
2025-07-11 20:28:01 bleepingcomputer DATA BREACH McDonald’s Job Applicant Data Exposed Due to Security Flaw
Cybersecurity researchers identified a vulnerability in McDonald's McHire platform, compromising the personal data of over 64 million U.S. job applicants. The McHire chatbot, Olivia, used weak default login credentials ("123456") on its admin panel, leading to unauthorized access. Through an IDOR vulnerability, researchers were able to manipulate the lead_id parameter in API requests to access applicants' personal data, such as chat transcripts and session tokens. The security flaw was found during a cursory review and involved both the weak credentials and the IDOR issue. McDonald's responded within an hour of the vulnerability being reported, and Paradox.ai, the third-party provider, resolved the issue on the same day. Following the incident, Paradox.ai deployed a fix for the IDOR vulnerability and commenced a thorough review of their systems to prevent similar occurrences in the future.
Details
2025-07-11 19:46:36 bleepingcomputer MALWARE Critical FortiWeb Vulnerability Allows Pre-Auth Remote Code Execution
Fortinet's FortiWeb web application firewall has a critical SQL injection vulnerability rated 9.8/10 in severity, identified as CVE-2025-25257. Vulnerability allows unauthenticated remote code execution by exploiting crafted HTTP or HTTPS requests targeting FortiWeb servers. The flaw exists in the FortiWeb's Fabric Connector function (`get_fabric_user_by_token`) which mistakenly processes SQL code from HTTP request headers. Proof-of-concept exploits, capable of opening reverse shells or a web shell, were released by cybersecurity firm WatchTowr and a researcher known as "faulty *ptrrr." Successful exploitation enables attackers to write arbitrary files on affected devices, escalating to remote code execution via misuse of Python scripts on the server. Fortinet has patched the issue in recent FortiWeb versions including 7.6.4, 7.4.8, 7.2.11, and older. Administrators are urged to update immediately as exploitation likelihood increases with the public availability of exploits. There is currently no evidence of active exploitation, but the situation is expected to change as attackers develop and deploy these exploits.
Details
2025-07-11 19:33:09 bleepingcomputer MALWARE Supply Chain Attack Targets WordPress Plugin Gravity Forms
The Gravity Forms plugin, widely used on WordPress sites, was compromised via a supply-chain attack affecting manual downloads from the official site. PatchStack, a security firm, identified malicious features in the plugin allowing remote code execution originating from manually installed versions. The compromised plugin collected metadata like URL, admin path, and plugin details, and sent this data to external host "gravityapi.org/sites." Exploited files within the plugin executed unauthenticated remote functions capable of altering site content and functionality. RocketGenius, the developer behind Gravity Forms, confirmed the issue was isolated to manual downloads between July 10 and 11, affecting certain versions. The malware prevented updates, fetched additional payloads, and enabled unauthorized admin account creation, giving attackers full site access. PatchStack advises affected users to reinstall the plugin using a clean version and check for any signs of further infection. RocketGenius stated that automatic updates and other installation methods via the Gravity API service were not compromised.
Details
2025-07-11 18:21:13 theregister CYBERCRIME Rapid Exploitation of Wing FTP Server Post-Disclosure Detected
CVSS 10.0-rated RCE vulnerability in Wing FTP Server exploited one day after its public disclosure. Over 10,000 customers, including high-profile firms and U.S. Air Force, potentially affected by the exploit. Attackers attempted to utilize the vulnerability by injecting Lua code via null byte manipulation in the username field. Initial attacks showed limited damage due to attackers' poor command execution and lack of sophistication. One attacker was observed looking up how to use curl during the attack, highlighting inexperience. Microsoft Defender intercepted an attempted Trojan download, preventing further harm. Victim organization isolated the compromised server shortly after detection, minimizing impact. Huntress researchers stress the importance of updating to patched version 7.4.4 for security.
Details