Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11642

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-11-07 10:37:16 thehackernews CYBERCRIME Credential Theft: A Growing Threat to Enterprise Security
A routine-looking password reset email led to a credential compromise for an employee, highlighting the risks of phishing attacks on organizational security. Compromised credentials are sold on dark web marketplaces, fetching around $15 each, but pose significant risks when scaled across an organization. Cybercriminals use various tactics, including automated botnets, to test millions of credential combinations across numerous websites, focusing on volume over precision. Stolen credentials can lead to quick financial fraud or be leveraged for strategic attacks like ransomware or intellectual property theft by organized crime groups. The impact of credential compromises extends beyond financial loss, potentially resulting in regulatory fines, lawsuits, and long-term reputational damage. Organizations are urged to proactively detect compromised credentials using tools like Outpost24’s Credential Checker to assess exposure and mitigate risks. Early detection and response are critical to reducing the threat posed by credential theft and preventing large-scale cyber incidents.
Details
2025-11-07 09:20:48 thehackernews CYBERCRIME Google Introduces Tool to Combat Review-Based Extortion on Maps
Google has launched a new feature on Google Maps allowing businesses to report extortion attempts involving fake negative reviews. This initiative targets "review bombing," where threat actors post false negative reviews to damage a business's reputation and demand ransom for removal. Scammers often contact business owners through third-party messaging apps, threatening further harm if payments are not made. Google advises caution against unexpected delivery texts or emails demanding fees and recommends downloading apps only from trusted sources. This development arises amid reports of Meta profiting from scam ads, with scams potentially making up 10.1% of its revenue. Meta has been criticized for allowing "high value accounts" to accrue numerous strikes without action, while smaller advertisers face stricter penalties. Meta claims to have removed over 134 million scam ads in 2025, though concerns about its ad policies persist.
Details
2025-11-07 09:01:43 theregister MISCELLANEOUS TeamViewer Enhances Security with Innovative Solutions and Compliance Focus
TeamViewer emphasizes a security-first approach, integrating robust protections such as AES-256 encryption and role-based access controls into its digital workplace solutions. The company conducts weekly security meetings during the early stages of product development to proactively address potential vulnerabilities and ensure compliance with evolving regulations. TeamViewer's products, like the DEX platform, offer comprehensive audit trails, granular permission management, and proactive threat detection to enhance enterprise security. Real-world applications include remote support for La Cimbali coffee machines, improving technician efficiency by 20% and reducing service travel costs by 15%. TeamViewer addresses thirdand fourth-party risks, as demonstrated by the Salesloft Drift breach, by providing visibility and governance over SaaS applications and integrations. The upcoming TeamViewer Security Center will offer tailored security recommendations, helping organizations prioritize measures as their environments evolve. TeamViewer's bug bounty programs and live hacking events engage the security community to identify and mitigate vulnerabilities, enhancing the overall security posture.
Details
2025-11-07 06:49:51 thehackernews MALWARE Malicious VS Code Extension and NPM Packages Pose New Threats
A malicious Visual Studio Code extension, "susvsex," with ransomware capabilities was identified, leveraging AI to automate file encryption and exfiltration on Windows and macOS systems. The extension, uploaded by "suspublisher18," activates on any event, encrypting files in a test directory and using GitHub as a command-and-control (C2) server. Microsoft swiftly removed the extension from the VS Code Marketplace, mitigating immediate risks but highlighting the potential for rapid updates to target more critical directories. Concurrently, Datadog Security Labs discovered 17 npm packages distributing the Vidar Stealer, marking the first use of npm for this information-stealing malware. The npm attack uses a postinstall script to download and execute Vidar Stealer from an external server, with over 2,240 downloads before the packages were removed. These incidents underline the persistent threat of supply chain attacks in open-source ecosystems, emphasizing the need for rigorous vetting of third-party code. Developers are advised to conduct thorough reviews of changelogs and remain vigilant against typosquatting and dependency confusion to safeguard against such threats.
Details
2025-11-07 00:30:43 bleepingcomputer NATION STATE ACTIVITY Suspected Foreign Cyberattack Breaches U.S. Congressional Budget Office
The U.S. Congressional Budget Office (CBO) experienced a cybersecurity breach, suspected to be by a foreign hacker, potentially exposing sensitive internal data. Immediate containment actions were undertaken by the CBO, including enhanced monitoring and new security controls to protect its network. The breach may have exposed emails and communications between congressional offices and CBO analysts, raising concerns among lawmakers. Some congressional offices have reportedly paused email exchanges with the CBO due to security concerns following the incident. The CBO, a nonpartisan agency, provides critical economic analysis and cost estimates for proposed legislation, making the breach significant. This attack is part of a broader trend of cyber incidents targeting U.S. government agencies, with previous breaches linked to Chinese APT group Silk Typhoon. The Silk Typhoon group has a history of exploiting vulnerabilities such as the ProxyLogon zero-day flaws in Microsoft Exchange Server.
Details
2025-11-06 22:52:36 theregister MALWARE Gootloader Resurgence: Rapid Domain Controller Compromise Detected
Gootloader malware has re-emerged, facilitating ransomware attacks with domain controller compromises occurring within 17 hours of initial access. Huntress identified three Gootloader infections since late October, attributing them to Storm-0494 and ransomware gang Vanilla Tempest (Rhysida). The malware employs custom WOFF2 fonts for filename obfuscation and SEO poisoning to lure victims via search engines like Bing. Attackers use WordPress comment submission endpoints to conceal encrypted payloads, leading to the installation of malicious JavaScript files. The infection chain includes deploying the Supper SOCKS5 backdoor for remote access, with reconnaissance activities starting within 20 minutes. Huntress has shared indicators of compromise, YARA rules, and Supper backdoor detections to aid organizations in identifying threats. The rapid attack progression underscores the critical need for swift detection and response to prevent domain controller breaches and ransomware deployment.
Details
2025-11-06 21:57:07 bleepingcomputer MALWARE AI-Generated Ransomware Extension Found on VS Code Marketplace
A malicious extension named susvsex, created with AI assistance, was discovered on Microsoft's VS Code marketplace, featuring basic ransomware capabilities. The extension, published by 'suspublisher18', openly advertised its malicious functions, including file theft and AES-256-CBC encryption. Secure Annex researcher John Tuckner reported the extension, but Microsoft initially did not remove it, raising concerns about the vetting process. The extension activates upon installation, using hardcoded variables and a function to encrypt and exfiltrate files to a command-and-control server. It also polls a private GitHub repository for commands, revealing the repository owner may be based in Azerbaijan. The extension's overt threat nature suggests it might be an experiment to test Microsoft's security measures, with potential for increased danger if refined. The extension was removed from the marketplace by the time of article publication, following inquiries from BleepingComputer to Microsoft.
Details
2025-11-06 19:02:44 bleepingcomputer CYBERCRIME Nevada Government's Transparent Response to Ransomware Attack
The State of Nevada experienced a ransomware attack affecting over 60 government agencies, disrupting essential services including websites and phone systems. The attack began with a state employee downloading a trojanized system administration tool, granting initial access to threat actors. Despite the breach being discovered in August, the initial compromise occurred in May, involving persistent backdoor access and lateral movement across critical servers. Nevada's response involved a 28-day recovery effort without paying ransom, relying on internal IT staff and incurring $259,000 in overtime costs. External vendor support during the incident response totaled over $1.3 million, yet the state saved an estimated $478,000 by not using contractors. The incident report provides a rare transparent account of the breach and recovery process, setting a precedent for handling cybersecurity incidents. The state's proactive measures included securing sensitive systems, removing outdated accounts, and resetting passwords to enhance cybersecurity defenses. Nevada's experience underscores the importance of continuous investment in cybersecurity to adapt to evolving threat landscapes.
Details
2025-11-06 18:53:30 theregister VULNERABILITIES Cisco Alerts on New Firewall Attacks and Critical Software Flaws
Cisco reports a new attack variant targeting its Secure ASA and FTD firewalls, exploiting vulnerabilities active since May 2025, causing denial-of-service conditions. The attacks have been linked to a government-backed threat group, previously identified in the ArcaneDoor campaign, targeting government and telecom sectors. Cisco has collaborated with US and UK cybersecurity agencies to address these threats, deploying a specialized team to support affected customers. Attackers have used advanced evasion techniques, including disabling logging and modifying Cisco's ROM Monitor to maintain persistence across reboots. Cisco has also disclosed two critical vulnerabilities in its Unified Contact Center Express software, urging immediate patching to prevent unauthorized command execution. These software vulnerabilities, CVE-2025-20354 and CVE-2025-20358, enable remote attackers to execute commands with elevated privileges or bypass authentication. Organizations are advised to update to the latest software releases to mitigate these risks and protect against potential exploitation.
Details
2025-11-06 15:32:07 thehackernews NATION STATE ACTIVITY Russia-Aligned Groups Target Ukraine with ESET Phishing Campaigns
A new threat group, InedibleOchotense, is impersonating ESET to conduct phishing attacks on Ukrainian entities, aiming to distribute the Kalambur backdoor. These attacks exploit ESET's reputation, using fake domains to distribute trojanized installers that deliver both legitimate software and malicious payloads. The Kalambur backdoor leverages the Tor network for command-and-control and enables remote access via RDP, posing significant security risks. CERT-UA identified similar campaigns linked to Sandworm, a known Russian APT group, highlighting ongoing threats to Ukrainian infrastructure. Sandworm has also launched destructive wiper attacks against various sectors in Ukraine, reinforcing the persistent threat from Russia-aligned actors. Another group, RomCom, exploited a WinRAR vulnerability in attacks targeting European and Canadian industries, reflecting a broader geopolitical strategy. RomCom's activities have evolved from e-crime to nation-state operations, supporting Russian objectives through credential harvesting and data exfiltration.
Details
2025-11-06 15:09:42 bleepingcomputer MISCELLANEOUS Enhancing Cyber Defense with Continuous Purple Teaming and BAS
The article discusses the integration of red and blue teams into a collaborative purple team, enhancing cybersecurity defenses through continuous validation and improvement. Breach and Attack Simulation (BAS) is highlighted as a critical tool for facilitating real-time, ongoing validation of security measures against evolving threats. Purple teaming shifts the focus from isolated offensive and defensive exercises to a unified approach, improving both detection and response capabilities. Automation in BAS eliminates manual delays, allowing for rapid simulation of adversary tactics and immediate assessment of control effectiveness. The methodology prioritizes addressing high-impact, hard-to-detect vulnerabilities, optimizing resource allocation and reducing the risk of breaches. Metrics such as time-to-detect and mean time to validate are used to measure the effectiveness of purple teaming, ensuring continuous progress. The article warns against over-reliance on AI for threat emulation, advocating for human oversight to ensure accuracy and relevance in simulations. Continuous validation through BAS leads to a proactive security posture, providing executives with tangible assurance of their organization's defensive capabilities.
Details
2025-11-06 15:00:17 thehackernews VULNERABILITIES Cisco Urges Immediate Patching for Critical Firewall Vulnerabilities
Cisco disclosed new attack variants targeting Secure Firewall ASA and FTD software, exploiting CVE-2025-20333 and CVE-2025-20362, potentially causing denial-of-service conditions on unpatched devices. The vulnerabilities, previously exploited as zero-day flaws, allow arbitrary code execution and unauthorized URL access, necessitating urgent updates to prevent further exploitation. Cisco has released patches addressing these critical flaws, alongside updates for Unified Contact Center Express vulnerabilities that could permit unauthorized file uploads and privilege escalation. A high-severity DoS vulnerability in Identity Services Engine (CVE-2025-20343) was also patched, preventing potential device restarts from crafted RADIUS access requests. The U.K. National Cyber Security Centre confirmed malware delivery via these vulnerabilities, emphasizing the importance of rapid patch deployment. Cisco credited security researcher Jahmel Harris for identifying these critical security issues, reinforcing the value of collaborative cybersecurity efforts. While no active exploitation in the wild has been reported, organizations are advised to apply the latest patches immediately to safeguard their systems.
Details
2025-11-06 14:38:52 bleepingcomputer MALWARE ClickFix Malware Evolves with Multi-OS Support and Video Tutorials
ClickFix attacks now incorporate video tutorials, enhancing social engineering tactics by guiding victims through self-infection processes, increasing the likelihood of successful malware execution. The malware automatically detects the victim's operating system, delivering tailored commands to execute, affecting Windows, macOS, and Linux users. A fake Cloudflare CAPTCHA challenge is used to trick users, complete with a countdown timer and a "users verified" counter to simulate legitimacy. Push Security researchers identified that these attacks are primarily distributed through malvertising campaigns on Google Search, exploiting outdated WordPress plugins or using SEO poisoning. The payloads vary by operating system and include MSHTA executables, PowerShell scripts, and other living-off-the-land binaries, posing significant risks to endpoint security. Future iterations of ClickFix could potentially execute entirely within the browser, circumventing traditional EDR protections and increasing the challenge for cybersecurity defenses. Users are advised to remain vigilant and avoid executing any terminal commands from online sources unless fully understood, as a precaution against these evolving threats.
Details
2025-11-06 14:08:32 theregister DATA BREACH Study Reveals Continued Use of Weak Passwords in Data Breaches
Comparitech published a study analyzing over two billion leaked passwords, identifying the most common and easily guessed passwords still in use. Popular passwords include "123456", "password", and "admin", with many entries featuring sequential number patterns, highlighting a persistent security risk. The study found that 25% of the passwords consisted solely of numbers, while 38% included the string "123", making them vulnerable to brute-force attacks. Comparitech advises the adoption of biometric passkeys or long passphrases to enhance security, emphasizing length over complexity. The use of password managers is recommended, though users should remain cautious of potential vulnerabilities in these tools. Enterprises are urged to enforce strict password policies to prevent users from choosing weak passwords and to mitigate security risks. The report serves as a reminder of the importance of robust password practices in safeguarding against unauthorized access and data breaches.
Details
2025-11-06 14:08:31 bleepingcomputer MALWARE ClickFix Malware Adopts Video Guides and OS Detection for Attacks
ClickFix malware campaigns have evolved to include video instructions, enhancing social engineering tactics by guiding victims through self-infection processes with malicious commands. The malware automatically detects the victim's operating system, ensuring the delivery of OS-specific commands to increase attack success rates. Push Security researchers observed the use of fake Cloudflare CAPTCHA challenges that incorporate a countdown timer, pressuring users to act quickly without verifying authenticity. Attackers employ JavaScript to automatically copy malicious commands to the clipboard, minimizing user error and increasing the likelihood of successful execution. ClickFix attacks are primarily propagated through malvertising on Google Search, exploiting outdated WordPress plugins or using SEO poisoning to enhance visibility. Payloads vary by operating system, with Windows attacks using MSHTA executables and PowerShell scripts, while other systems face different living-off-the-land binaries. Future iterations of ClickFix may run entirely in browsers, potentially bypassing Endpoint Detection and Response (EDR) protections. Users are advised to remain cautious of online verification processes that require code execution, as these are likely malicious attempts.
Details