Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12778
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-05-15 15:34:02 | theregister | MISCELLANEOUS | Socket Acquires Coana to Enhance Security Alert Efficiency | Socket has acquired Coana, a startup aimed at improving how security vulnerabilities are prioritized by letting users know which alerts can be ignored.
Coana, founded by researchers from Aarhus University, employs reachability analysis to determine if attackers can realistically exploit reported vulnerabilities.
The tool's efficiency lies in its use of static analysis, which allows for rapid, scalable evaluations with minimal false negatives or positives.
Traditional security tools produce an excessive number of alerts, creating noise and increasing workload for developers, which Coana’s approach aims to reduce.
Reachability analysis by Coana is especially effective for dynamic languages like JavaScript and Python, where static analysis is more challenging.
The acquisition helps Socket address its users' concerns regarding overwhelming security alerts from dependency scans in application software libraries.
Socket's CEO noted an ongoing challenge with the volume of security alerts and mentioned catching around 500 malicious packages weekly. | Details |
| 2025-05-15 15:20:20 | bleepingcomputer | MISCELLANEOUS | Tor Introduces Oniux for Enhanced Linux App Anonymization | Tor has launched Oniux, a new tool to anonymize network traffic of any Linux application through the Tor network.
Unlike torsocks, Oniux employs Linux namespaces for creating isolated network environments, enhancing security by preventing data leaks.
Oniux isolates applications at the kernel level, ensuring all traffic is routed through Tor, utilizing a virtual interface and custom DNS settings.
The tool is designed to be leak-proof with kernel-enforced isolation, which significantly surpasses the capabilities of torsocks.
Despite its innovative approach, Oniux is still in an experimental phase and not recommended for critical operations until further testing.
Tor has published the source code and calls for community engagement to test and refine Oniux to ensure its reliability for broader deployment.
Users interested in testing the tool can install it using Rust and specific commands provided by the Tor Project. | Details |
| 2025-05-15 14:31:17 | thehackernews | DATA BREACH | Coinbase Inside Job Leads to Data Leak and Extortion Attempt | Coinbase suffered a data breach orchestrated by cyber criminals who bribed internal customer support agents in India, leading to unauthorized data access.
The attackers copied account data of less than 1% of Coinbase's 9.7 million monthly users to potentially deceive them into transferring cryptocurrency.
The threat actors attempted to extort $20 million from Coinbase by threatening to release sensitive customer and internal information.
No critical data such as passwords, private keys, or customer funds were compromised, and Coinbase Prime accounts remained secure.
Coinbase has terminated the employment of the involved customer agents and is taking measures to reimburse affected customers.
Enhanced security measures, including additional ID checks for large withdrawals and strengthened defenses against insider threats, are being implemented.
Coinbase has announced a $20 million reward for information leading to the arrest and conviction of the responsible parties.
Customers are advised to enhance security by enabling withdrawal allow-listing, two-factor authentication, and remaining vigilant against impostors. | Details |
| 2025-05-15 13:48:44 | bleepingcomputer | MALWARE | NPM Package Hides Malware Using Unicode Steganography, Targets Users | Researchers identified a malicious NPM package named 'os-info-checker-es6' that employs Unicode steganography to conceal command-and-control links within Google Calendar events.
Originally benign when added to NPM on March 19, the package began incorporating malicious elements in subsequent updates, significantly changing by May 7 to include sophisticated malware delivery mechanisms.
The package, downloaded over 1,000 times, mimics a utility tool while secretly acting as a malware vector, impacting multiple users.
'os-info-checker-es6' is linked as a dependency in four other questionable NPM packages that pose as accessibility and development tools, potentially expanding its reach.
The complex attack involves fetching a base64-encoded URL obscured within a Google Calendar event, which then directs to the actual malicious payload.
Despite discoveries and reporting by Veracode, the harmful NPM packages remain available for download, posing ongoing risks to unsuspecting developers.
The incident underscores the need for increased vigilance and robust security measures within software development environments, particularly in package management ecosystems. | Details |
| 2025-05-15 13:39:33 | theregister | DATA BREACH | Snowflake CISO Enhances Security After Major Data Breaches | Last spring, significant data breaches at Snowflake impacted major clients like Ticketmaster and Santander, involving unauthorized data access through exposed customer credentials.
The breaches affected hundreds of millions and were facilitated by the misuse of stolen user credentials lacking multi-factor authentication—highlighting gaps in the shared responsibility security model.
Snowflake’s CISO, Brad Jones, emphasized a shift from a shared responsibility model to a "shared destiny" model, strengthening proactive partnerships with customers to enhance security.
Following the incidents, Snowflake mandated multi-factor authentication by default for new accounts and planned the phased elimination of single-factor password logins by November 2025.
To further secure customer data, Snowflake implemented uniform security controls, private networking options, default encryption, and a service to detect and lock accounts with compromised credentials found on the dark web.
The CISO highlighted new security challenges, particularly with AI, stressing the importance of adapting security measures rapidly in response to AI's evolving risks and capabilities.
Microsoft’s three-phase model for agentic AI development, from basic chatbots to independent operation, presents new governance and security considerations.
Snowflake’s approach now focuses on enabling business needs securely, reflecting the improv rule of "yes, and" to integrate necessary controls without stifling innovation. | Details |
| 2025-05-15 13:33:22 | bleepingcomputer | DATA BREACH | Coinbase Insider Assisted Data Breach Exposes Customer IDs | Coinbase disclosed a significant data breach involving compromised customer information including government IDs, organized with the help of rogue overseas support agents.
Cybercriminals demanded a $20 million ransom to avoid public release of the data, which Coinbase refused to pay, instead establishing a reward fund of equal amount to find the perpetrators.
No customers' private keys or passwords were stolen, and Coinbase Prime accounts and wallets remain secure.
Coinbase terminated the employment of the involved insiders who facilitated unauthorized access to the systems.
The breach has potential financial implications estimated between $180 million and $400 million, mainly for remediation and customer compensations for those deceived into sending funds to attackers.
The company plans to open a new U.S.-based support hub and increase investments in security measures, including insider-threat detection and automated response systems.
Coinbase urges customers to use two-factor authentication and be cautious of scammers impersonating company employees. | Details |
| 2025-05-15 13:33:22 | bleepingcomputer | MALWARE | Malicious NPM Package Harnesses Steganography and C2 Mechanisms | Researchers discovered a malicious npm package named "os-info-checker-es6" which initially posed as a benign utility but later included malware.
The package, camouflaging malicious content with invisible Unicode characters and using Google Calendar links, was downloaded over 1,000 times.
Introduced to the npm in March with a benign intent, it later received updates adding malwares and complex command-and-control mechanisms.
This package, alongside four others it's listed as a dependency for, leverage developer tools aesthetics to mask underlying harmful activities.
The malicious code is hidden using Unicode steganography by embedding invisible characters that lead to a Google Calendar URL hosting malware.
After redirections to finally achieve an HTTP 200 OK, a base64-encoded URL is scraped and decoded to deliver the final malware payload.
Despite the payload not being retrievable at the time of research, this indicates either an early stage or a temporary pause in the attack campaign.
Following Veracode's discovery and report to npm regarding the suspicious packages, the packages were still live on the platform. | Details |
| 2025-05-15 11:29:54 | thehackernews | MISCELLANEOUS | Why Continuous Penetration Testing is Essential for Security | Annual penetration tests are insufficient due to rapid developments and new vulnerabilities in software updates.
Compliance frameworks like PCI DSS and HIPAA guide security but do not ensure vulnerability protection post-assessment.
Continuous security testing is crucial to identify and fix new vulnerabilities before they are exploited by attackers.
Strategic pen testing incorporates regular tests, integration with other security measures, and customization based on specific threats.
Resource constraints and lack of qualified personnel hinder effective penetration testing implementation in many organizations.
A cultural shift in organizations toward continuous testing and proactive risk management is necessary for improved security.
Combining External Attack Surface Management (EASM) and Penetration Testing as a Service (PTaaS) can optimize security effectiveness.
Outpost24's CyberFlex offers integrated solutions for continuous, flexible testing tailored to specific business needs. | Details |
| 2025-05-15 10:36:24 | thehackernews | MALWARE | Strategies to Enhance Ransomware Recovery and Prevention | Ransomware has become more sophisticated, leveraging legitimate IT tools and services such as Ransomware-as-a-Service (RaaS) to conduct widespread attacks.
Microsoft reported misuse of its Quick Assist tool for deploying Black Basta ransomware, highlighting the evolving tactics of cybercriminals.
The economic impact of ransomware could escalate to $275 billion annually by 2031, with attacks predicted to occur every 2 seconds.
A robust business continuity and disaster recovery (BCDR) strategy, including the upgraded 3-2-1-1-0 backup rule, is critical for organizational resilience against ransomware.
Immutable and isolated backups, continuous backup monitoring, and regular restore testing are paramount to ensure data integrity and recovery capabilities.
Enhancing backup systems with anomaly detection and integrating them with security operations can expedite threat detection and response.
Regular employee training on cyber hygiene and proactive threat reporting can further fortify the first line of defense against ransomware.
Incorporating comprehensive BCDR solutions like Datto can streamline the implementation of these strategies and bolster overall ransomware preparedness. | Details |
| 2025-05-15 10:12:38 | thehackernews | NATION STATE ACTIVITY | APT28 Targets Government Email Servers in Espionage Campaign | A Russia-linked hacking group, APT28, exploited webmail software vulnerabilities to conduct cyber espionage, primarily against Eastern European governmental and defense entities.
The campaign, named Operation RoundPress by ESET, began in 2023, utilizing cross-site scripting (XSS) attacks, including a zero-day vulnerability in MDaemon.
Targets expanded globally, including governmental bodies in Africa, Europe, and South America, with a focus on harvesting email communication and sensitive data.
Besides MDaemon, the XSS flaws exploited were found in other popular webmail platforms such as Horde, Roundcube, and Zimbra.
The CVE identifier CVE-2024-11182 (MDaemon zero-day) and other related vulnerabilities in different platforms were patched, highlighting the importance of timely software updates.
The malware used in the attacks, dubbed SpyPress, had capabilities like stealing credentials, emails, contact information, and maintaining access via Sieve rules in Roundcube.
US CISA added CVE-2023-43770 associated with Roundcube to its Known Exploited Vulnerabilities catalog, underlining the severity and attention these exploits have garnered. | Details |
| 2025-05-15 10:04:45 | thehackernews | MALWARE | Sophisticated Malware Deploys Via Npm Package and Google Calendar | A malicious npm package named "os-info-checker-es6" was found using Unicode steganography and Google Calendar to drop payloads.
"Os-info-checker-es6" mimics an operating system info tool to facilitate the installation of further malicious code undetected.
Utilizes a Google Calendar event link with a Base64-encoded title that points to a remote C2 server, increasing difficulty in blocking the attack.
The package was first uploaded on March 19, 2025, and has been downloaded over 2,000 times.
No significant malicious activities were noted in the first five versions of the package; changes began appearing in later versions from May 7, 2025.
Another npm package by the same developer, implying potential links in a broader malicious campaign.
Security experts suggest combining behavioral analysis, static and dynamic testing, and thorough validation of third-party packages to combat such threats.
The overview was part of a broader analysis detailing emerging cyber threats in software supply chains in the first half of 2025. | Details |
| 2025-05-15 08:27:12 | bleepingcomputer | MALWARE | Google Releases Update to Patch High-Severity Chrome Vulnerability | Google has released updates to fix a high-severity vulnerability in Chrome that could potentially lead to account takeovers.
The flaw (CVE-2025-4664) was publicly exploitable and found in Chrome’s Loader component allowing cross-origin data leakage through malicious HTML pages.
The vulnerability was first reported by a Solidlab security researcher and relates to the improper enforcement of referrer-policy in HTTP headers.
Exploitation of this vulnerability could expose sensitive user data, such as OAuth query parameters, which might lead to unauthorized account access.
Patches have been issued for desktop versions of Chrome (136.0.7103.113 for Windows/Linux and 136.0.7103.114 for macOS).
Google encourages users to update their browser immediately to the latest patched version or allow Chrome to automatically install updates.
The company had previously addressed a Chrome zero-day vulnerability earlier in the year used in targeted attacks against Russian entities.
Google’s proactive patching approach continues as a response to the increasing number of zero-day vulnerabilities being exploited. | Details |
| 2025-05-15 06:34:31 | theregister | MALWARE | DragonForce Ransomware Hits Major Retailers, Avoids Russian Targets | DragonForce, a ransomware-as-a-service (RaaS) group, began its operations in August 2023 and has since claimed 158 victims including major retailers like Marks & Spencer.
The group explicitly prohibits attacks on targets within the Commonwealth of Independent States, particularly emphasizing a no-attack policy on Russia and its allies.
In March, DragonForce rebranded as a "cartel," enabling affiliates to use its infrastructure for deploying ransomware beyond the group's proprietary code.
The FBI identified DragonForce as one of the most prolific ransomware sources in 2024, highlighting the significant threat posed by their expansive affiliate network.
Despite speculations, there is no conclusive evidence linking DragonForce to Russia, although it operates on multilingual forums including Ramp, thought to be managed in Russia.
DragonForce has set ethical boundaries by warning affiliates against targeting hospitals with critical care units, threatening punishment for violations.
The groups’ operating model not only democratizes ransomware deployment but potentially increases its visibility and risk of law enforcement intervention. | Details |
| 2025-05-15 06:21:48 | thehackernews | MALWARE | Google Updates Chrome to Fix Documented Malicious Vulnerability | Google has issued updates for Chrome to address a high-severity vulnerability allowing cross-origin data leaks.
Identified as CVE-2025-4664, the security flaw was exploited in the wild, with a CVSS score of 4.3.
The vulnerability results from insufficient policy enforcement related to the Loader component in versions prior to 136.0.7103.113.
Attackers could exploit this issue by setting the referrer-policy to "unsafe-url" in the Link header, enabling them to capture full query parameters.
These parameters could include sensitive information potentially leading to account takeovers.
Security expert Vsevolod Kokorin first detailed this vulnerability, highlighting the unique risk in Chrome compared to other browsers.
Users are urged to update their Chrome browsers immediately, and other Chromium-based browsers should follow suit as updates become available.
This is the second Chrome vulnerability reported this year that has been actively exploited. | Details |
| 2025-05-14 20:46:52 | theregister | CYBERCRIME | Nucor Halts Production Across Multiple Sites Due to Cyberattack | Nucor, the largest U.S. steel manufacturer, temporarily shut down production after a cyber intrusion was detected on its servers.
The company filed an 8-K with the SEC revealing that specific IT systems were compromised, prompting shutdowns at some facilities.
Third-party security experts and law enforcement have been engaged to investigate the incident.
The nature of the cyberattack and specifics about the affected facilities remain undisclosed.
The attack on Nucor underscores the vulnerability of critical infrastructure in the U.S. to both nation-state actors and ransomware groups.
Nucor is in the process of restarting operations, though details about the recovery’s timeline are not provided.
Previous incidents, like the Colonial Pipeline cyberattack, highlight the potentially severe consequences and motivations behind targeting major U.S. infrastructure. | Details |