Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12749
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-06-18 05:41:58 | thehackernews | NATION STATE ACTIVITY | Iran Curtails Internet Amid Intensifying Cyber Conflicts with Israel | Iran has significantly throttled internet speeds following escalated conflicts, purportedly to block Israeli cyber attacks.
Iranian spokesperson cited internet stability as the reason for this action, describing the slowdown as "temporary, targeted, and controlled."
NetBlocks reported a marked decline in Iranian internet traffic on the day of the implementation.
The cyber exchanges include attacks on Iran's Bank Sepah by a pro-Israel group, Predatory Sparrow, impacting the bank’s online and ATM services.
Predatory Sparrow accuses Bank Sepah of supporting Iran's controversial activities, including its missile and nuclear programs.
Heightened cyber activity from Iranian state actors and affiliated hacktivist groups has been observed, targeting various regional entities.
The Iranian government has also advised citizens to delete WhatsApp, claiming, without evidence, that it is being used by Israel for espionage.
The U.S. Department of State is seeking information on Iranian hackers suspected of targeting critical infrastructure in the U.S. and other countries using specific malware tools. | Details |
| 2025-06-18 03:36:01 | theregister | NATION STATE ACTIVITY | Trump Postpones TikTok Sale Deadline Amid Ongoing Trade Disputes | President Trump has decided to delay the enforcement of a law mandating TikTok to sell its U.S. operations or cease operations, marking this as the third delay.
The law, titled "Protecting Americans from Foreign Adversary Controlled Applications Act," was initially passed with strong bipartisan support and aimed to safeguard U.S. national security.
The deadline for TikTok's divestiture was initially set for January 19th, 2025, but has been extended multiple times, now moving to June 19th.
Trump cited the ongoing U.S.-China trade disputes as a significant barrier to finalizing the sale and indicated that a resolution could expedite the process.
Despite potential national security concerns, Trump acknowledged a personal affinity for TikTok, highlighting its role in his political campaigns.
Currently, there is no resolution on the trade issues, nor clarity on potential American buyers for TikTok, leaving significant uncertainty about the app's future and security implications. | Details |
| 2025-06-17 21:21:53 | theregister | MISCELLANEOUS | AWS Achieves 100% MFA Enforcement, Unveils New Security Features | AWS has achieved 100% multi-factor authentication (MFA) enforcement for root users across all account types.
Announcement made by AWS Chief Information Security Officer Amy Herzog at the re:Inforce cloud security conference.
New security measures and capabilities rolled out at the conference to enhance cloud security for customers.
AWS Identity and Access Management Access Analyzer introduced, providing insights into internal access to critical resources.
AWS Security Hub now offers enhanced data analysis tools to help prioritize and respond to security issues more effectively.
GuardDuty Extended Threat Detection, optimized for container-based applications, adds improved threat detection capabilities.
AWS introduces network security director in Shield to manage network security posture and mitigate threats like DDoS and SQL injections.
The implementation supports AWS's commitment to the CISA Secure by Design pledge, despite challenges like budget cuts and key staff departures. | Details |
| 2025-06-17 21:21:52 | bleepingcomputer | CYBERCRIME | Paddle Settles $5 Million for Facilitating Tech Scams | Paddle.com and its U.S. subsidiary agreed to pay $5 million to settle FTC allegations of enabling deceptive tech support scams, primarily targeting U.S. consumers, including older adults.
The UK-based payment processor was accused of inadequate screening and fraud prevention, which allowed foreign operators to exploit the U.S. credit card system with tech support scams.
Scammers, including known offenders like Restoro, Reimage, and PC Vark, used fake virus alerts impersonating major brands to sell unnecessary software or services.
Paddle processed significant amounts for these operators, over $12.5 million for PC Vark and $37 million for Restoro and Reimage, despite high complaint and chargeback rates.
Internal communications at Paddle indicated awareness of the fraudulent activities and their impact on vulnerable consumers but took measures to hide these activities to evade bank and network scrutiny.
The FTC claimed Paddle acted as an unregistered payment facilitator, breaching Visa and Mastercard rules, and continued relations with high-risk clients for profit.
As part of the settlement, Paddle must adhere to strict conditions, including avoiding processing payments for entities engaged in deceptive practices.
The case highlights the importance of consumer vigilance against unsolicited tech support claims and the necessity for businesses to maintain rigorous compliance and detection systems to prevent fraud. | Details |
| 2025-06-17 19:19:36 | thehackernews | NATION STATE ACTIVITY | Zero-Day Exploit in Google Chrome Used to Install Trinper Backdoor | TaxOff exploited a zero-day vulnerability (CVE-2025-2783) in Google Chrome to deploy the Trinper backdoor.
The attack targeted Russian organizations, leveraging phishing emails designed as invitations to specific forums to distribute malicious links.
Google patched this vulnerability after it was reported by Kaspersky during Operation ForumTroll.
Trinper features include keystroke recording, file gathering, and remote command execution via a C2 server.
Positive Technologies uncovered a similar past attack, also initiated via a phishing email disguised as a conference invitation, leading to speculation about connections to other hacking groups.
Variations in the attack methodologies include the use of different malware loaders like Donut and Cobalt Strike.
The backdoor employs multithreading technology enhancing concealment and parallel data processing.
Strategic use of zero-day vulnerabilities and sophisticated malware indicates the group’s intent for long-term access and data exfiltration from targeted systems. | Details |
| 2025-06-17 19:04:45 | bleepingcomputer | DATA BREACH | Scania Faces Data Breach and Extortion Over Stolen Insurance Claims | Scania confirmed a cybersecurity breach where attackers accessed insurance claim documents through stolen external IT partner credentials.
The attackers threatened to leak the stolen data unless their ransom demands were met.
The compromised system, "insurance.scania.com," was provided by an external IT partner.
The breach was detected after threat actors posted on a hacking forum about selling the stolen data.
Stolen documents might contain sensitive personal, financial, or medical data, heavily impacting affected individuals.
Attackers used a ProtonMail address to send extortion emails directly to several Scania employees.
Scania has notified privacy authorities and stated the breach had limited impact, but investigations are ongoing. | Details |
| 2025-06-17 17:37:31 | thehackernews | CYBERCRIME | LangSmith Bug Puts OpenAI Keys and User Data at Risk | A high-risk vulnerability in LangChain's LangSmith platform, identified as AgentSmith, could allow attackers to steal sensitive data like API keys and user inputs.
The flaw, carrying a CVSS score of 8.8, enabled unauthorized interception of communications between users and malicious agents configured with a proxy server.
Attackers could deploy malicious agents on LangChain Hub, which users could then interact with, unknowingly routing data through the attackers' server.
Compromised information may include OpenAI API keys and user prompts, leading to potential unauthorized model access, data breaches, and significant financial impacts.
Following responsible disclosure and swift action by LangChain, the vulnerability was patched to prevent data interception and added warnings for potential proxy misuse.
The security lapse had potential long-term effects, including legal liabilities and reputational harm for affected organizations due to unauthorized access to proprietary data and intellectual property.
Separate reporting highlighted the emergence of new 'WormGPT' variants, demonstrating ongoing threats in the cybercrime arena linked to generative AI tools. | Details |
| 2025-06-17 17:04:19 | theregister | CYBERCRIME | Critical Flaws in Sitecore CMS Enable Full System Takeover | Security researchers at watchTowr uncovered multiple pre-authentication vulnerabilities in Sitecore CMS, prominently used by leading global companies.
Three of the seven discovered vulnerabilities were publicly disclosed, allowing for full system control when chained together.
One critical vulnerability involved hardcoded internal passwords, notably an internal account set with the password "b", which was brute-forced in just three seconds.
Another vulnerability included a path traversal flaw in the ZIP unpacking mechanism, leading to remote code execution (RCE) when combined with the aforementioned password issue.
A third disclosed vulnerability involved an unrestricted file upload flaw, also leading to RCE when exploited.
Despite advisements against modifying default credentials, Sitecore's stance and documentation encouraged users to keep default settings, complicating security practices.
These vulnerabilities were discovered in the most recent version of Sitecore at the time of the report, with patches only recently released for some issues.
Over 22,000 Sitecore instances were found to be exposed, increasing the criticality of addressing these vulnerabilities in deployed environments. | Details |
| 2025-06-17 16:53:11 | bleepingcomputer | CYBERCRIME | Instagram Ads Exploit Deepfakes in Banking Scam Campaign | Instagram ads fraudulently impersonating Canadian banks like BMO and EQ Bank have been targeting users with phishing scams and investment fraud.
The ads misuse official bank branding and AI-generated deepfake videos to lure victims to phishing sites seeking personal and banking information.
An example highlighted includes an ad for "Eq Marketing" that directs users to a counterfeit website, mimicking EQ Bank’s branding to collect banking credentials.
Another scam ad features a fake "BMO Belski" story, misusing the name of BMO’s Chief Investment Strategist to attract potential investors to a fraudulent WhatsApp group.
Scammers deploy ads via Facebook pages with follower counts likely bolstered by bots, utilizing the platform's pass-through capabilities to Instagram to avoid direct detection.
Despite being reported, the fraudulent ads continued to appear on Instagram, prompting involvement from BMO and EQ Bank, and reaching out to Meta for further action.
Meta has pledged to investigate and remove fraudulent content, while EQ Bank has already begun proactive measures on social media platforms to tackle these high-fidelity scams.
These incidents highlight the importance of user vigilance on social media advertising and the necessity of verifying the authenticity of promotional claims through official channels. | Details |
| 2025-06-17 15:49:00 | bleepingcomputer | CYBERCRIME | Critical RCE Vulnerability Patched in Veeam Backup Servers | Veeam issued security updates to address multiple vulnerabilities in their Backup & Replication software, including a critical RCE flaw.
The RCE vulnerability, identified as CVE-2025-23121, affects systems integrated into domain environments and is exploitable by authenticated domain users.
This flaw was specifically prevalent in Veeam Backup & Replication version 12 and later until it was resolved in the latest release, version 12.3.2.3617.
Following insecure practices, many enterprises have integrated their backup servers into a Windows domain rather than following Veeam's advice to use separate Active Directory Forests and dual-factor authentication for admin accounts.
Ransomware groups like Cuba and FIN7 have historically exploited similar Veeam vulnerabilities to facilitate data theft and hinder recovery by deleting backups prior to ransomware deployment.
Veeam's backup solutions are widely used globally, including by 82% of Fortune 500 companies and 74% of the Global 2,000, making these vulnerabilities significant in scale and impact. | Details |
| 2025-06-17 15:14:07 | bleepingcomputer | MALWARE | Exploitation of Sitecore CMS via Hardcoded Password and Zip Slip | A series of vulnerabilities in Sitecore Experience Platform (XP) can lead to remote code execution (RCE) by exploiting a hardcoded password, "b," for an internal user account.
The exploit chain involves three distinct vulnerabilities, starting with unauthorized authentication access through a backdoor login path.
Attackers can gain an authenticated session by bypassing Sitecore's backend login checks, leading to subsequent exploitation steps.
The second vulnerability exploited is a "Zip Slip" flaw within Sitecore’s Upload Wizard, allowing the execution of originally restricted paths.
Potential attackers can upload malicious files, including web shells, directly into the webroot of the server, enabling further remote code execution.
If the Sitecore PowerShell Extensions (SPE) module is installed, a third vulnerability allows arbitrary file uploads to any specified path, circumventing security controls.
Over 22,000 Sitecore instances are publicly exposed, posing substantial security risks, especially to sectors like banking and global enterprises.
Patches were released in May 2025 with detailed CVE publications delayed until June 17, 2025, urging immediate updates to mitigate potential exploitation risks. | Details |
| 2025-06-17 15:03:47 | theregister | CYBERCRIME | Elevating Identity Security for Autonomous AI Systems | Agentic AI systems function autonomously, adapting and acting with minimal human intervention, raising new cybersecurity challenges.
These AI agents require complex identity and access management as they hold similar privileges within systems as human users do.
Traditional identity and access management frameworks are inadequate for these dynamic, decision-making machines, necessitating new security models.
Machine identities are being targeted by threat actors, exploiting AI's capabilities to mimic human identities and manipulate autonomous decisions.
Organizations must adopt identity-first security strategies, treating AI agents as privileged entities and embedding strict controls and surveillance throughout the AI lifecycle.
Delinea suggests a structured approach, including mapping AI agents’ access, aligning their privileges with specific tasks, and monitoring their activity with robust encryption and real-time logging.
Swift action in redefining identity security frameworks and integrating advanced protections is essential to guard against evolving security threats and keep pace with technological advancements. | Details |
| 2025-06-17 15:03:46 | bleepingcomputer | DATA BREACH | UK Fines 23andMe for Major Genetic Data Breach | The UK Information Commissioner's Office (ICO) fined 23andMe £2.31 million for failing to secure sensitive genetic and personal data.
A credential stuffing attack compromised the data of approximately 4.1 million people in the UK and Germany, including 1 million Ashkenazi Jews.
The breach, undetected from April to September 2023, led to the unauthorized release of data on platforms like Reddit and BreachForums.
Post-breach, 23andMe enhanced security measures, including mandatory two-factor authentication and forced password resets.
The ICO considered 23andMe's cooperative behavior before finalizing the penalty, which aligns with their Data Protection Fining Guidance.
23andMe, amid financial troubles and bankruptcy, settled a related lawsuit for $30 million in September 2024. | Details |
| 2025-06-17 14:05:25 | bleepingcomputer | MISCELLANEOUS | Streamlining IT Ticket Management with AI Automation | Uzado Inc., a Canadian IT service provider, leverages a Tines Pages AI-powered workflow to automate IT ticket responses.
The automated system allows employees to submit IT issues via a form, automating responses and directing tickets to appropriate IT personnel.
This system is designed to handle repetitive and simple tickets such as password resets, reducing manual workload for IT teams.
The AI workflow automatically resolves about 10% of total tickets, allowing IT staff to focus on more complex issues.
Users benefit from faster resolutions and prefer the AI-guided troubleshooting process to traditional methods.
The guide includes detailed steps for deploying the AI workflow in various IT environments, including optional tool integrations for broader functionality.
The solution aims to enhance both operational efficiency and security postures, adapting to the fast-paced changes in IT threats. | Details |
| 2025-06-17 13:56:03 | theregister | DATA BREACH | UK Fines 23andMe £2.3M for Massive Genetic Data Breach | The UK's Information Commissioner's Office (ICO) fined 23andMe £2.31 million for a significant data breach exposing the genetic data of nearly 7 million users.
The breach was uncovered after a joint investigation by the ICO and the Office of the Privacy Commissioner of Canada, focusing on security lapses at 23andMe.
Attackers used credential-stuffing techniques from April to September 2023, directly affecting approximately 14,000 accounts but leading to wider exposure due to the DNA Relatives feature.
Sensitive data, including personal, familial, and health information of 155,592 UK residents was compromised, with overall impacted users around 6.9 million.
23andMe acknowledged the breach five months after it began, and it was delayed in implementing preventative measures until nearly a year after initial findings.
23andMe has filed for Chapter 11 bankruptcy, raising questions about its ability to pay the fine; however, the ICO expects compliance with enforcement actions.
Enhanced security and privacy measures have been promised by TTAM Research Institute, which is set to acquire 23andMe. | Details |