Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12780
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-05-07 13:57:11 | thehackernews | DDOS | Europol Dismantles DDoS Services and Arrests Operators | Europol announced the takedown of six DDoS-for-hire platforms used in thousands of global cyber-attacks.
Four individuals were arrested by Polish authorities, and the US seized nine related domains.
The compromised DDoS services enabled attacks on schools, governments, and businesses for fees as low as EUR 10.
These platforms lacked technical entry barriers, offering user-friendly interfaces for orchestrating attacks.
Seized services operated under names such as cfxapi, cfxsecurity, and quickdown, offering various subscription plans.
Operation PowerOFF, with Dutch and German collaboration, targets the dismantling of DDoS-for-hire infrastructure, resulting in previous arrests and service disruptions.
Recent reports by cloud security firms identified a shift towards hybrid architectures in DDoS services, blending botnets with dedicated servers. | Details |
| 2025-05-07 13:47:49 | thehackernews | MALWARE | Exploits in OttoKit WordPress Plugin Affect Over 100K Sites | A second critical vulnerability in the OttoKit WordPress plugin is currently being exploited.
The flaw, identified as CVE-2025-27007 with a CVSS score of 9.8, allows for unauthenticated privilege escalation.
All plugin versions up to 1.0.82 are susceptible; users are urged to update to version 1.0.83 immediately.
The exploit involves unverified initial connections enabling attackers to create administrative accounts.
Attackers are also targeting a related vulnerability, CVE-2025-3102, suggesting a broader, coordinated attack.
Exploitation attempts have been observed since May 2, 2025, with a significant increase on May 4, 2025.
Due to over 100,000 installations, the impact potential of this exploit is extensive, affecting numerous WordPress sites globally. | Details |
| 2025-05-07 13:47:49 | bleepingcomputer | CYBERCRIME | Masimo Corp Warns of Cyberattack Impacting Production and Deliveries | Medical device manufacturer Masimo Corporation reported a significant cyberattack affecting its production capabilities and causing delays in customer order fulfillments.
The incident, disclosed via an SEC Form 8-K filing, occurred on April 27, 2025, targeting the company's on-premise network systems.
Despite the attack, Masimo’s cloud-based infrastructure remains unaffected; however, several on-premise systems have been isolated to prevent further damage.
The breach has led to operational disruptions, with some manufacturing facilities operating below normal levels, impacting the company's ability to process and ship orders as scheduled.
The specific type of cyberattack has not been detailed, but the company is currently working with external cybersecurity experts to investigate and restore normal operations.
Law enforcement has been notified of the incident, and an ongoing investigation aims to determine the precise nature and scope of the breach.
Masimo has not identified any claims from ransomware groups regarding responsibility for the attack as of this reporting. | Details |
| 2025-05-07 13:23:15 | bleepingcomputer | CYBERCRIME | CISA Issues Warning on Cyber Threats to U.S. Oil and Gas Sectors | CISA has alerted that basic cyber attack techniques are being used to target U.S. oil and natural gas infrastructure.
Threats could cause operational disruptions, physical damage, and compromise of industrial control systems and operational technology.
Despite the simplicity of the attack methods, the impact is potentially significant due to poor cybersecurity practices in critical infrastructure sectors.
Joint advisory from CISA, FBI, EPA, and DOE provided guidelines for enhancing security, including the removal of public-facing OT devices and enforcing strong password policies.
Advice was also given to use VPNs with multifactor authentication, demilitarize zones for IT and OT network segmentation, and maintain robust failover and recovery processes.
Practicing manual control operations and routine testing of emergency protocols were emphasized to ensure resilience against disruptions.
Regular collaboration with third-party service providers was recommended for additional security support and tailored defensive strategies. | Details |
| 2025-05-07 11:38:46 | thehackernews | MALWARE | SysAid Addresses Critical Vulnerabilities Enabling Remote Code Execution | Cybersecurity researchers revealed multiple critical vulnerabilities in the on-premise version of SysAid IT support software.
The flaws, identified as CVE-2025-2775, CVE-2025-2776, and CVE-2025-2777, involve XML External Entity (XXE) injections allowing pre-authenticated remote code execution.
Attackers could exploit these to perform Server-Side Request Forgery (SSRF) attacks and potentially execute remote code by injecting unsafe XML entities.
An additional related vulnerability, CVE-2025-2778, involves OS command injection, which could further facilitate remote code execution.
Successful exploitation could allow unauthorized access to sensitive data, including plaintext administrator passwords, enabling full administrative control.
SysAid has released a software update version 24.4.60 to patch these vulnerabilities.
A proof-of-concept (PoC) exploit showing the combined use of these vulnerabilities has been made public, raising the urgency for updates.
This is not the first time SysAid has been targeted; previous exploitations were reported in CVE-2023-47246 incidents involving ransomware attacks by Cl0p. | Details |
| 2025-05-07 11:28:28 | bleepingcomputer | DDOS | Global Crackdown on DDoS-for-Hire Services Leads to Multiple Arrests | Polish authorities, in collaboration with international law enforcement, arrested four individuals connected to six DDoS-for-hire platforms.
These platforms facilitated thousands of cyberattacks globally, targeting sectors like education, government, commerce, and gaming.
The services, marketed as legitimate stress-testing tools, were primarily used for disrupting online operations through excessive traffic, causing service outages.
The crackdown involved coordinated efforts by Germany, the Netherlands, Poland, and the U.S., leading to the seizure of domains and data important for further investigations.
Dutch police created decoy booter sites to educate potential users about the legality and surveillance of such services.
International cooperation, under Operation PowerOFF, has been pivotal since December 2018 in combatting the proliferation of DDoS-for-hire platforms.
This operation highlights ongoing efforts to dismantle cybercrime networks and the instrumental role of data sharing between countries in tackling such illegal activities. | Details |
| 2025-05-07 10:59:21 | thehackernews | MISCELLANEOUS | Reassessing SSEs: Closing Gaps in Browser-level Security | Security Service Edge (SSE) platforms are essential for securing hybrid work environments and SaaS access, offering centralized policy enforcement and connectivity.
SSEs, however, have a critical limitation: they lack visibility and control over activities within the browser, where significant user risks and sensitive activities occur.
Current SSE implementations fail to monitor or control real-time actions inside browser tabs, making them vulnerable to attacks, insider threats, and data leaks.
To address these vulnerabilities, organizations are adopting browser-native security solutions such as Enterprise Browsers and Enterprise Browser Extensions.
These browser-native platforms enhance security by providing controls directly within the browser, suitable for unmanaged devices and remote users.
Combining SSE with browser-native security offers comprehensive protection, extending from network-level to user-level interactions.
The integration of both security approaches encourages a revaluation of conventional security frameworks, focusing more on user interaction points.
The report advocates for a shift in security paradigms to encompass end-to-end protection in light of evolving threats and the increased use of browser-based applications. | Details |
| 2025-05-07 10:49:43 | thehackernews | MALWARE | Exploiting Zero-Day, Play Ransomware Targets U.S. Organization | Threat actors linked to the Play ransomware family exploited CVE-2025-29824, a recently patched Microsoft Windows zero-day vulnerability, targeting an unnamed U.S. organization.
The attackers utilized a privilege escalation flaw in the Common Log File System (CLFS) driver and potentially accessed the network through a Cisco Adaptive Security Appliance.
Symantec's findings indicate the exploit was implemented using bespoke tools, including a customized information stealer named Grixba and disguised executable files in the Music folder.
During the attack, commands were executed to collect details on all machines in the target's Active Directory, storing outcomes in a CSV file, although no ransomware payload was deployed during the intrusion.
Artifact files created during the attack were discovered in the C:\ProgramData\SkyPDF path, indicative of the sophisticated nature of this specific exploitation attempt.
Notably, the attack involves advanced tactics like creating and adding a new administrator user, and ensuring cleanup of exploit traces.
This incident reflects the broader trend of ransomware attackers leveraging zero-day vulnerabilities to infiltrate targets, a tactic previously noted in other ransomware campaigns. | Details |
| 2025-05-07 10:35:51 | theregister | DDOS | Curl Project Founder Frustrated by Flood of AI-Generated Bug Reports | Curl project founder Daniel Stenberg is implementing stricter report screening due to a surge in AI-generated bug reports which waste maintainers' time.
Stenberg likens the excessive number of invalid AI-assisted reports to a DDoS attack, draining resources and contributing to maintainer burnout.
A new policy on HackerOne now requires reporters to disclose the use of AI in their submissions, with immediate bans for those submitting low-quality reports.
The increase in AI-generated reports has significantly impacted the workflow, with none of the AI-generated submissions in the past six years identifying a valid bug.
Peers in the industry, like Python's Seth Larson, also express concerns about the costs associated with addressing these deceptive but initially plausible reports.
Low-quality reports, treated as almost malicious, heighten stress and the risk of burnout among key contributors to open-source projects.
Despite offering substantial bounties for valid bug discovery, the curl project has not paid out for any AI-generated reports, highlighting their ineffectiveness.
The incident that prompted Stenberg's decisive action involved a report that initially seemed credible but turned out to be based on nonexistent functions. | Details |
| 2025-05-07 07:40:19 | thehackernews | MALWARE | Malicious Discord Utility Package Exposes Thousands to Cyber Threats | Security researchers identified a malicious package named "discordpydebug" on the Python Package Index that acts as a remote access trojan.
Although appearing as a tool for Discord bot developers, the disguise actually conceals malware capable of serious cyber activities.
Installed over 11,500 times, the RAT can manipulate files, execute commands, and exfiltrate sensitive data.
The RAT manipulates outbound HTTP polling to avoid detection and can bypass most traditional security defenses.
Reflecting broader security issues, over 45 related hazardous npm packages were also found, all linked to a singular cyber threat actor.
The findings highlight a significant and ongoing software supply chain vulnerability, suggesting heightened scrutiny is necessary for software developers and the platforms hosting such packages. | Details |
| 2025-05-07 06:32:08 | thehackernews | NATION STATE ACTIVITY | NSO Group Ordered to Pay $168M for WhatsApp Spyware Misuse | A federal jury mandated NSO Group to pay approximately $168 million to WhatsApp for deploying Pegasus spyware, affecting over 1,400 global individuals.
The lawsuit, initiated by WhatsApp against NSO Group in 2019, highlighted the targeting of journalists, activists, and dissidents using the Pegasus spyware.
Victims included 456 individuals in Mexico, with significant numbers also in India, Bahrain, Morocco, and Pakistan, spanning 51 different countries.
The spyware exploited a critical zero-day vulnerability in WhatsApp’s voice calling feature to disseminate.
U.S. District Judge Phyllis J. Hamilton emphasized NSO's violation of both federal and state laws, and the contradictory claims of NSO regarding its users' activities and intents.
WhatsApp plans to seek a permanent injunction against NSO's operations targeting its platform and will donate to digital rights organizations to combat similar vulnerabilities.
In total, punitive damages were set at $167,254,000, with an additional $444,719 in compensatory damages for the efforts involved in mitigating the attack vectors.
This ruling represents a significant victory for privacy advocates and has further legal and ethical implications for the global surveillance software industry. | Details |
| 2025-05-07 04:10:37 | theregister | MISCELLANEOUS | New Zealand Proposes Social Media Age Restriction Bill for Under-16s | New Zealand’s government endorses a bill to ban social media access for users under 16, though not as a formal government initiative.
The proposal, introduced by MP Catherine Wedd, requires social media companies to verify the age of new users.
Incidents of cyber-bullying, exposure to inappropriate content, and social media addiction are key concerns driving the bill.
Prime Minister Christopher Luxon emphasizes the need for safety measures online, similar to those in the physical world.
The legislation suggests penalties up to NZ$2 million for platforms that fail to accurately verify user ages.
There is uncertainty about the bill’s progression, as it needs advocacy without direct support from the party machinery.
The bill is met with interest from the opposition and aligns with global trends towards protecting children online, mirrored by similar movements in Australia and the UK. | Details |
| 2025-05-06 23:58:23 | theregister | CYBERCRIME | Meta Wins $168M in Damages Against NSO for WhatsApp Spyware | In May 2019, WhatsApp engineers uncovered a zero-day flaw allowing NSO's Pegasus spyware to install via a phone call, compromising around 1,400 accounts.
The jury awarded Meta over $167 million in damages after NSO used the flaw for spying, affecting the privacy of WhatsApp users.
Pegasus spyware provided NSO's clients unchecked access to phone and data actions, including activating cameras and microphones for covert surveillance.
NSO had tried various legal defenses, including claiming sovereign immunity and asserting they only served government entities.
The court proceedings revealed NSO spent significant amounts on developing malicious technology, capable of breaching both iOS and Android systems.
Meta intends to donate any received damages to digital-rights groups, emphasizing their commitment to privacy and security.
Post-verdict, NSO Group is considering further legal actions, maintaining their technology aids in preventing serious crimes and terrorism. | Details |
| 2025-05-06 20:48:15 | theregister | DATA BREACH | Whistleblower Fired After Exposing Unauthorized Server Room Access | James Papa, a former service delivery manager at Computacenter, was dismissed from his role after he reported unauthorized access to Deutsche Bank’s server rooms.
Papa claimed a Computacenter employee granted his girlfriend, Jenny, multiple unauthorized entries into Deutsche Bank's server rooms, where she had access to sensitive banking data.
CCTV footage confirmed that Deutsche Bank's security team allowed Jenny to enter the server rooms without proper authorization, despite repeated warnings from Papa.
Computacenter and Deutsche Bank allegedly interrogated Papa aggressively after he raised concerns about the security lapses and advised notifying the SEC.
Papa was suspended and later terminated by Deutsche Bank under purported pressure, despite him being the only one fired for the incident.
He has filed a lawsuit against Computacenter, Deutsche Bank, and its veep of datacenter operations for wrongful termination, violating whistleblower protection laws, and negligence, seeking over $20 million in damages.
The incident raises significant concerns about security protocols and corporate accountability at Deutsche Bank’s U.S. facilities. | Details |
| 2025-05-06 18:33:45 | theregister | MISCELLANEOUS | Pentagon Overhauls Software Procurement to Boost Security | The US Department of Defense (DoD) is revamping its outdated software procurement systems to enhance security.
Katie Arrington, DoD's CIO, launched the Software Fast Track (SWFT) initiative aimed at reforming the acquisition, testing, and authorization of software.
The initiative will address cybersecurity and Supply Chain Risk Management (SCRM), making processes more agile and transparent in the face of complex software development challenges.
Current procurement processes lack speed and visibility into software supply chains, which SWFT aims to improve significantly.
Key goals include defining clear cybersecurity requirements, verifying software security, and expediting software adoption with an implementation plan expected within 90 days.
The efforts align with broader objectives to equip military personnel with secure, high-quality software tools rapidly, enhancing both lethality and resilience.
Challenges persist with securing government software, evidenced by recent malware attacks targeting the DoD and leaks of sensitive information.
The DoD's use of unclassified communication tools like Signal for official business has raised concerns about security and the handling of confidential information. | Details |