Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12589

Checks for new stories every ~15 minutes

Title Summary
ROWS
2026-01-29 17:06:23 theregister CYBERCRIME Google Disrupts Major Residential Proxy Network Used by Cybercriminals
Google’s Threat Intelligence Group (GTIG) has significantly disrupted IPIDEA, a large residential proxy network exploited by over 550 threat groups in January 2026. Residential proxy networks allow cybercriminals to mask their malicious traffic as legitimate, posing significant risks to both individual users and corporate environments. IPIDEA was found to enroll devices into its network via proxy software and SDKs, often without the users' full understanding, compromising millions of devices. The disruption of IPIDEA's operations involved collaboration with industry partners like Spur, Lumen's Black Lotus Labs, and Cloudflare, targeting domain resolution and network infrastructure. GTIG's actions reduced the pool of compromised devices by millions, impacting the network's ability to support criminal activities and potentially affecting associated botnets. Residential proxies, while legal, are frequently misused for anonymity in cybercrime, with IPIDEA linked to botnets such as BadBox 2.0, Aisuru, and Kimwolf. The initiative aims to have long-term impacts on cybercriminal marketplaces, reducing the availability of hijacked consumer devices for malicious purposes.
Details
2026-01-29 17:00:26 theregister CYBERCRIME eScan and Morphisec Clash Over Alleged Supply Chain Compromise
A dispute has arisen between antivirus vendor eScan and security firm Morphisec over a reported incident involving eScan's update server, with both parties presenting conflicting accounts. Morphisec claimed a "critical supply-chain compromise," alleging hackers used eScan's update system to distribute malicious files, affecting some customers' systems. eScan countered these claims, stating it detected suspicious activity internally and initiated an incident response, issuing a security advisory and remediation patch promptly. The incident involved unauthorized access to a regional update server, leading to a rogue file appearing briefly in the update path, affecting a limited number of systems. eScan reported no data exfiltration and maintained that its antivirus functionality remained intact, although some systems required manual remediation to restore update capabilities. The disagreement has escalated legally, with eScan seeking retractions of Morphisec's claims, which it describes as factually inaccurate, leading to the removal of some social media posts. eScan has taken measures to secure its infrastructure, including pulling systems offline for checks, rebuilding affected systems, and enhancing monitoring protocols.
Details
2026-01-29 16:07:40 theregister MISCELLANEOUS Seven Habits for Enhancing Software Security Without Delaying Delivery
Security teams face increasing pressure from rising supply chain threats, tighter regulations, and fast-paced development cycles, necessitating effective security practices. Many organizations are adopting consistent habits to integrate security into daily workflows, aiming for improved baseline security rather than perfection. Chainguard is hosting a webinar to guide security and engineering leaders in identifying impactful security habits for software pipelines. The session will cover seven practical approaches to reduce risk while maintaining delivery speed, relevant for application security and DevOps professionals. Challenges include managing CVEs, unexpected vulnerabilities, and the high short-term costs of remediation, often leading to deferred fixes. The webinar offers actionable insights for enhancing security in environments utilizing containers and modern CI/CD pipelines. Attendees will gain practical strategies applicable to both new and existing workloads to strengthen supply chain security programs.
Details
2026-01-29 15:09:11 theregister DATA BREACH ShinyHunters Breach Exposes 10 Million Records from Match Group Apps
ShinyHunters claims to have breached Match Group, accessing over 10 million records from dating apps like Hinge, Match.com, and OkCupid. The breach reportedly includes personal user data, employee details, and internal documents, with AppsFlyer identified as the potential source of exposure. Match Group confirmed the security incident, stating that no user login credentials or financial information were accessed and that they are investigating with external experts. The company is notifying affected users and has acted swiftly to terminate unauthorized access, reinforcing its commitment to user safety. ShinyHunters also claims to have stolen 30 GB of data from Bumble, though Bumble has not yet commented on the incident. This breach follows ShinyHunters' recent campaign targeting approximately 100 organizations using stolen Okta credentials, affecting major SaaS companies. The incident raises concerns about the volume of behavioral data collected and shared by dating apps, highlighting potential privacy risks for users.
Details
2026-01-29 15:09:11 bleepingcomputer MALWARE Infostealer Malware Exploits Gaming Mods to Breach Enterprises
Infostealer malware disguised as gaming mods targets children and teenagers, leveraging their frequent downloads of third-party files to infiltrate systems. These malware variants, including Lumma, RedLine, Vidar, and Raccoon, extract sensitive data like passwords, session cookies, and authentication tokens from infected devices. A significant portion of infostealer infections, over 40%, originates from gaming-related files, making gamers a prime target for cybercriminals. Once executed, infostealers rapidly harvest identity data, which is then sold on dark web marketplaces, posing significant risks to corporate security. The breach risk extends beyond personal devices; if infected devices access corporate networks, they can compromise sensitive business credentials. Infostealers bypass traditional security measures by exploiting user behavior, such as running untrusted code, rather than exploiting software vulnerabilities. Organizations are advised to educate employees and their families about the risks of downloading unverified software and to monitor for compromised credentials actively.
Details
2026-01-29 15:00:12 bleepingcomputer DDOS Aisuru Botnet Sets Record with 31.4 Tbps DDoS Attack
The Aisuru/Kimwolf botnet launched a record-breaking DDoS attack, peaking at 31.4 Tbps and 200 million requests per second, primarily targeting telecommunications companies. Cloudflare detected and mitigated the attack on December 19, naming the campaign “The Night Before Christmas” due to its timing and scale. The attack involved hyper-volumetric HTTP DDoS tactics and Layer 4 DDoS attacks, making it the largest publicly disclosed attack of its kind. Aisuru's power stems from compromised IoT devices and routers, with recent attacks sourced from Android TVs, according to Cloudflare's report. Cloudflare's 2025 Q4 DDoS Threat Report notes a 121% increase in DDoS incidents compared to 2024, with a significant rise in network-layer attacks. The most targeted sectors were telecommunications, IT services, gambling, and gaming, with Bangladesh, Ecuador, and Indonesia as major attack sources. The report reveals a 600% rise in network-layer attacks over 100 Mpps and a 65% increase in attacks exceeding 1 Tbps, reflecting a growing threat landscape.
Details
2026-01-29 14:52:15 bleepingcomputer CYBERCRIME Microsoft Teams Introduces Feature to Report Suspicious Calls Globally
Microsoft is launching a feature in Teams allowing users to report suspicious calls, aiming to combat potential scams and phishing attempts within the platform. The "Report a Call" feature will be enabled by default, with administrators having the option to disable it via the Teams Admin Center. Available for one-to-one calls on Windows, Mac, and web, users can flag calls by selecting "Report a Call" from the call history. When a call is reported, limited metadata is shared with the user's organization and Microsoft, enhancing visibility into potential threats. The feature will initially roll out to Targeted Release customers in mid-March, with global availability expected by late April. Organizations with Defender for Office 365 or Defender XDR licenses can access detailed reports, while others will receive basic data in the Teams Admin Center. This initiative follows recent security enhancements in Teams, including the ability to report false-positive threat alerts and block external users to prevent cybercrime.
Details
2026-01-29 13:59:22 theregister VULNERABILITIES Speedy Exploit Use Puts Pressure on Patch Management Practices
Cisco Talos reports that vulnerability exploits accounted for nearly 40% of intrusions in Q4 2025, emphasizing the need for rapid patching. Notable vulnerabilities like Oracle EBS and React2Shell were exploited within hours of disclosure, highlighting the speed of attacker adaptation. A BitSight analysis indicates that private sector organizations often take months to patch critical vulnerabilities, increasing risk exposure. Phishing remains a prevalent attack vector, responsible for 32% of access cases, with some campaigns targeting Native American tribal organizations. Recommendations include implementing MFA, monitoring for MFA abuse, and ensuring comprehensive logging for incident response. Ransomware incidents have decreased to 13%, suggesting potential consolidation among criminal groups rather than a reduction in activity. Organizations are advised to limit public exposure of vulnerable systems when immediate patching is not feasible.
Details
2026-01-29 13:37:53 bleepingcomputer DATA BREACH France Travail Fined €5 Million for Massive Data Breach Incident
The French data protection authority fined France Travail €5 million for a data breach that compromised the personal information of 43 million job seekers. The breach involved unauthorized access to sensitive data, including names, dates of birth, and national insurance numbers, but did not affect bank details or account passwords. Hackers exploited social engineering techniques to hijack accounts of CAP EMPLOI advisers, impacting the agency's ability to safeguard personal information. France Travail is required to document corrective measures and provide a detailed implementation schedule to avoid further penalties. Failure to comply with CNIL's orders will result in daily fines of €5,000 until security issues are addressed. This incident follows a previous breach in August 2023, affecting 10 million individuals, highlighting ongoing security challenges for France Travail. The CNIL has a history of imposing substantial fines for data protection failures, as seen with recent penalties against Google and Free Mobile.
Details
2026-01-29 13:05:08 thehackernews CYBERCRIME FBI Seizes RAMP Cybercrime Forum, Disrupting Criminal Operations
The FBI has taken control of the RAMP cybercrime forum, a significant platform for illegal activities, impacting its operations and users. The forum, accessible via Tor and clearnet, was seized with the cooperation of the U.S. Attorney's Office and the Department of Justice's Computer Crime and Intellectual Property Section. RAMP was established in 2021 after other forums banned ransomware promotion, and was managed by Mikhail Pavlovich Matveev, known by various aliases. Criminal groups like Nova and DragonForce are moving to alternative platforms like Rehub, indicating the cybercriminal community's adaptability. The takedown creates risks for threat actors, such as loss of reputation and operational exposure, as they shift to new environments. The seizure highlights ongoing law enforcement efforts to dismantle cybercriminal infrastructure and disrupt illegal online activities.
Details
2026-01-29 12:16:47 theregister NATION STATE ACTIVITY Sandworm Targets Poland's Power Grid in Winter Cyberattack
A cyberattack on Poland's power grid, attributed to the Russian group Sandworm, threatened energy supply during winter, potentially endangering civilian lives. Dragos reported that the attack targeted distributed energy resources (DERs), marking a new approach in Sandworm's tactics against critical infrastructure. The attackers used DynoWiper malware, consistent with past Sandworm operations, to compromise remote terminal units and communication infrastructure. Despite the attack's sophistication, it did not cause power outages but resulted in irreparable damage to some equipment. The coordinated attack across multiple sites highlights the vulnerability of DERs, which often lack robust cybersecurity measures compared to centralized facilities. Incident responders are investigating whether the attackers attempted to alter device functionality or aimed solely to disable remote monitoring capabilities. The event underscores the need for enhanced cybersecurity investments in distributed energy systems to mitigate risks from state-sponsored threats.
Details
2026-01-29 11:59:54 thehackernews VULNERABILITIES Study Reveals Critical Cybersecurity Gaps in Global Energy Systems
OMICRON's study of over 100 energy installations identified significant cybersecurity vulnerabilities in operational technology (OT) networks, affecting substations, power plants, and control centers worldwide. Key vulnerabilities include unpatched devices, insecure external connections, and weak network segmentation, often detected within minutes of deploying StationGuard intrusion detection systems. Organizational challenges, such as unclear OT security responsibilities and limited resources, contribute to the risks, highlighting the need for specialized security strategies. The convergence of IT and OT environments in energy systems is outpacing current security measures, increasing exposure to cyber threats. Common technical issues include outdated firmware with known vulnerabilities, undocumented external connections, and flat network architectures that expand potential attack surfaces. Operational issues identified include VLAN misconfigurations and network redundancy problems, impacting system reliability and amplifying cyber incident consequences. OMICRON's StationGuard provides comprehensive asset visibility and threat detection, offering utilities the tools to enhance security without disrupting operations.
Details
2026-01-29 11:59:54 bleepingcomputer VULNERABILITIES Google Enhances Android Security with New Theft Protection Features
Google has launched updated Android theft protection features aimed at reducing smartphone theft and safeguarding user data from financial fraud. Enhancements include stronger authentication measures and recovery tools, building on anti-theft defenses introduced in October 2024. The Failed Authentication Lock feature now offers granular controls, automatically locking screens after excessive failed attempts, with user-configurable settings. Identity Check has been expanded to require biometric authentication for actions outside trusted locations, protecting apps using Android Biometric Prompt. Google updated Remote Lock to include an optional security challenge, verifying device ownership before locking lost or stolen devices. In Brazil, new Android devices will have Theft Detection Lock and Remote Lock enabled by default, enhancing security against "snatch-and-run" thefts. These security updates are available for devices running Android 10 or later, with authentication safeguards requiring Android 16 or later. Google's in-call scam protection, introduced in Android 16, has expanded to multiple financial apps in the U.S., warning users of risks during screen sharing.
Details
2026-01-29 10:32:06 thehackernews MISCELLANEOUS Strategic Decisions for CISOs to Mitigate Downtime Risks in 2026
Enterprises face significant risks from operational downtime, which can lead to substantial financial damage beyond direct cyberattack impacts. CISOs are advised to prioritize decisions that reduce dwell time and enhance company protection against evolving threats. Emphasizing relevant threat intelligence is crucial, as outdated or low-quality data hinders effective security operations. ANY.RUN's Threat Intelligence Feeds provide timely, verified insights, improving threat detection by up to 58% and reducing business disruption risks. Reducing false positives is key to mitigating analyst burnout and improving SOC performance, with ANY.RUN's feeds delivering near-zero false positive rates. Accelerating the transition from detection to response is vital, with enhanced context from threat intelligence feeds shortening response times by 21 minutes. CISOs should focus on empowering analysts with actionable intelligence to streamline operations and reduce the risk of operational downtime.
Details
2026-01-29 09:03:29 thehackernews VULNERABILITIES SolarWinds Patches Critical Web Help Desk Security Flaws
SolarWinds has issued updates for its Web Help Desk software to address four critical vulnerabilities, including authentication bypass and remote code execution (RCE) risks. The vulnerabilities, identified by researchers from Horizon3.ai and watchTowr, include critical deserialization flaws that allow unauthenticated attackers to execute arbitrary OS commands remotely. Two of the vulnerabilities, CVE-2025-40551 and CVE-2025-40553, involve deserialization of untrusted data, a reliable attack vector that poses significant security threats. Additional vulnerabilities, CVE-2025-40552 and CVE-2025-40554, are authentication bypass issues that can also lead to RCE, amplifying their potential impact. Previous flaws in SolarWinds' Web Help Desk have been actively exploited, prompting the U.S. CISA to add them to its Known Exploited Vulnerabilities catalog. Organizations using SolarWinds Web Help Desk are urged to update to version WHD 2026.1 promptly to mitigate these critical security risks. Continuous vigilance and timely patching are crucial as past vulnerabilities in the platform have been weaponized, posing ongoing threats to IT service management environments.
Details