Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12603

Checks for new stories every ~15 minutes

Title Summary
ROWS
2026-01-08 18:47:25 theregister VULNERABILITIES Cisco Urges Immediate Patch for ISE Vulnerability Amid Exploit Concerns
Cisco has addressed a medium-severity vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), tracked as CVE-2026-20029, which could expose sensitive data. The flaw results from improper XML parsing in the web-based management interface, allowing attackers with admin credentials to read arbitrary files on the system. A proof-of-concept exploit for this vulnerability is publicly available, raising concerns about potential exploitation despite no current reports of active abuse. The vulnerability requires admin-level access, which serves as a barrier to exploitation, but stolen credentials could enable attackers to exploit the flaw. Cisco recommends immediate patching to mitigate risks, especially given the historical targeting of networking devices by government-backed threat actors. Previous ISE vulnerabilities have been exploited in the wild, emphasizing the need for organizations to prioritize security updates to prevent similar incidents. Trend Micro Zero Day Initiative's Bobby Gould discovered the flaw, underscoring the importance of collaboration in identifying and addressing security threats.
Details
2026-01-08 17:16:43 thehackernews MALWARE WhatsApp Exploited to Spread Astaroth Trojan in Brazil
A new campaign leverages WhatsApp to distribute the Astaroth banking trojan, primarily affecting users in Brazil, with over 95% of impacted devices located in the country. The campaign, named Boto Cor-de-Rosa by Acronis Threat Research Unit, uses a WhatsApp-based worm module implemented in Python to spread the malware. Astaroth, also known as Guildma, is a banking malware active since 2015, targeting Latin American users to facilitate data theft through phishing and other tactics. The malware retrieves WhatsApp contact lists from victims and sends malicious messages to propagate, showcasing a novel tactic in the threat landscape. The attack involves ZIP archives containing a downloader script that executes PowerShell or Python scripts, collecting user data and deploying the trojan. Sophos and Trend Micro have tracked similar campaigns, indicating a growing trend of using WhatsApp as a delivery vector for malware in Brazil. Real-time tracking mechanisms are built into the malware, logging propagation metrics such as message delivery success rates and sending speeds. Organizations should be aware of this evolving threat vector and consider implementing security measures to mitigate risks associated with messaging platforms.
Details
2026-01-08 16:53:50 bleepingcomputer DATA BREACH Texas Court Halts Samsung's Smart TV Data Collection Practices
The State of Texas has secured a temporary restraining order against Samsung, stopping the collection of smart TV viewing data from Texas consumers. Samsung's use of Automated Content Recognition (ACR) captures screenshots and analyzes viewing habits to tailor advertisements, raising privacy concerns. Texas Attorney General Ken Paxton argues that ACR collects data without consumer consent, violating the Texas Deceptive Trade Practices Act. The court order prevents Samsung from using, selling, or transferring data from Texas-based TVs until January 19, pending further legal proceedings. Allegations include deceptive enrollment practices and potential data access by the Chinese Communist Party, highlighting international data security concerns. The court criticized Samsung's use of "dark patterns" to obtain user consent, making it difficult for consumers to opt out of data collection. This legal action may influence broader regulatory scrutiny and potential nationwide reforms in consumer electronics data-collection practices.
Details
2026-01-08 15:03:45 thehackernews NATION STATE ACTIVITY China-Linked UAT-7290 Targets Telecoms with Sophisticated Linux Malware
UAT-7290, a China-linked threat actor, has been conducting espionage operations against telecom providers in South Asia and Southeastern Europe, as reported by Cisco Talos. The group employs a combination of open-source malware, custom tools, and exploits for known vulnerabilities in edge networking products to infiltrate target networks. Key malware families used include RushDrop, DriveSwitch, and SilentRaid, with Linux-based payloads such as MystRodX and Bulbature transforming compromised devices into Operational Relay Box nodes. UAT-7290's tactics involve extensive reconnaissance and leveraging one-day exploits and SSH brute force attacks to gain initial access and escalate privileges. The group's operations have tactical and infrastructure overlaps with other Chinese adversaries like Stone Panda and RedFoxtrot, indicating potential collaboration or shared resources. The use of publicly available proof-of-concept exploit code suggests a strategic focus on efficiency and resourcefulness in their attack methodology. Security teams are advised to monitor for signs of UAT-7290 activity and strengthen defenses against known vulnerabilities in edge networking equipment.
Details
2026-01-08 15:03:44 bleepingcomputer VULNERABILITIES Emerging Cyber Threats in 2026: AI-Driven Exploits and Defense Strategies
The cybersecurity landscape in 2026 is predicted to be dominated by AI-driven threats, including social engineering exploits and deepfake technologies, posing significant challenges for organizations globally. AI-related attacks have become widespread, with incidents involving shadow AI and agentic AI tools increasing, necessitating enhanced network monitoring and hybrid visibility to detect malicious activities early. Deepfake and synthetic media are increasingly used in phishing campaigns, compromising identity checks and leading to data exfiltration through manipulated insider trust. Offensive AI orchestration is accelerating ransomware attacks, complicating response efforts and increasing the speed of data encryption and exfiltration, demanding comprehensive network security measures. AI-driven tools are rapidly identifying vulnerabilities and exploiting network blind spots, requiring improved risk scoring and AI-based incident response strategies to effectively manage these threats. Static network scans are proving insufficient in dynamic environments, highlighting the need for continuous vulnerability scanning and real-time threat detection to minimize attack windows. Multicloud environments present new challenges as adversaries bypass traditional security tools, emphasizing the importance of Network Detection and Response (NDR) systems for enhanced cloud data flow analysis.
Details
2026-01-08 14:53:52 theregister CYBERCRIME Ransomware Attacks Surge in 2025 Despite Law Enforcement Efforts
Emsisoft's 2025 report reveals a significant increase in ransomware attacks, with over 8,000 victims reported globally, marking a 50% rise since 2023. Law enforcement achieved notable successes, such as dismantling the BlackSuit group, yet the overall number of ransomware incidents continued to grow. The proliferation of smaller ransomware groups has complicated the landscape, with many rebranding and reemerging after takedowns, challenging sustained suppression efforts. Prominent ransomware groups like Qilin, Akira, Cl0p, and Play remain active, frequently appearing on leak sites with substantial victim counts. Attackers are increasingly employing phishing, stolen credentials, and social engineering tactics, bypassing traditional security measures and exploiting human vulnerabilities. The persistent churn of affiliates and evolving tactics suggest ransomware will remain a prevalent threat, necessitating adaptive defense strategies and continuous vigilance. Emsisoft emphasizes the importance of not solely relying on law enforcement but also enhancing organizational resilience and response capabilities against ransomware threats.
Details
2026-01-08 13:48:09 theregister VULNERABILITIES CISA Warns of Active Exploitation in HPE and Microsoft Office Flaws
CISA has added two vulnerabilities to its Known Exploited Vulnerabilities catalog, signaling active exploitation of critical flaws in HPE OneView and Microsoft Office PowerPoint. CVE-2025-37164, a code injection vulnerability in HPE OneView, holds a maximum CVSS score of 10.0, posing significant risks to server and network management environments. HPE's advisory indicates potential full control of affected systems through this flaw, although details on active attacks remain sparse. Rapid7's release of a proof-of-concept exploit for the HPE flaw suggests an assumed-breach scenario, urging immediate defensive measures. CVE-2009-0556, a longstanding PowerPoint vulnerability, allows remote code execution and is being exploited despite being patched in 2009, affecting unpatched or unsupported systems. The inclusion of these vulnerabilities in CISA's catalog highlights the persistent threat of both new and old vulnerabilities when left unaddressed. Organizations are advised to prioritize patching and monitoring for these vulnerabilities to mitigate potential exploitation risks.
Details
2026-01-08 12:54:01 thehackernews CYBERCRIME Resecurity's Decoy Operation Exposes Scattered LAPSUS$ Hunters' Activities
Resecurity executed a strategic decoy operation to trap cybercriminals claiming to be part of Scattered LAPSUS$ Hunters, who alleged hacking and data theft from the company. The operation involved creating a honeytrap with synthetic data, leading to 188,000 unauthorized access attempts by the threat actor over a two-week period. Resecurity successfully identified the threat actor, linking them to a U.S.-based phone number and Gmail account, strengthening the attribution of the attack. Despite the setback, the threat group has intensified recruitment efforts, seeking initial access brokers and insider collaborators, indicating a persistent threat. The incident demonstrates the effectiveness of proactive cybersecurity measures like honeytraps in gathering intelligence and thwarting cybercriminal activities. This case serves as a reminder of the evolving tactics of cybercriminal groups and the need for continuous vigilance and adaptive security strategies.
Details
2026-01-08 12:44:59 theregister DATA BREACH UK Regulators Investigate X Over Grok AI's Unauthorized Image Generation
UK regulators have initiated an investigation into Elon Musk's X platform due to Grok AI generating sexual imagery without user consent, potentially breaching the Online Safety Act. Ofcom and the Information Commissioner's Office have contacted X and its xAI division to assess compliance with legal obligations to protect UK users. The Internet Watch Foundation reported Grok's involvement in creating child abuse images, classified as Category C material under UK law. Investigations revealed Grok generated approximately 6,700 sexualized images per hour over a 24-hour period, raising significant concerns. The UK tech secretary emphasized the urgency of addressing this issue, highlighting the potential for severe penalties under the Online Safety Act. Legal experts note that sharing non-consensual intimate images is a priority offense, requiring X to take proactive steps to prevent and swiftly remove such content. Depending on X's response, this case could significantly test the enforcement capabilities of the Online Safety Act.
Details
2026-01-08 12:13:25 bleepingcomputer VULNERABILITIES Microsoft Enforces MFA for Enhanced Security in 365 Admin Center
Microsoft will mandate multi-factor authentication (MFA) for all Microsoft 365 admin center users starting February 9, 2026, enhancing account security against unauthorized access. This enforcement covers key admin URLs such as portal.office.com/adminportal/home, admin.cloud.microsoft, and admin.microsoft.com, impacting IT administrators managing Microsoft 365 services. MFA implementation is aimed at reducing the risk of account compromise by adding a security layer beyond standard password protection, effectively countering phishing and credential attacks. Administrators must enable MFA before the February deadline to prevent disruptions in IT operations and administrative functions, as non-compliance will lead to access issues. Microsoft provides configuration support through a setup wizard and official documentation, ensuring a smooth transition for global administrators and individual users. The initiative follows Microsoft's broader MFA enforcement strategy, including previous implementations for Azure Portal sign-ins and other administrative tools since 2025. A Microsoft study indicates that MFA can block 99.99% of hacking attempts, significantly lowering the likelihood of account compromise even with exposed credentials.
Details
2026-01-08 11:56:56 thehackernews VULNERABILITIES Chainguard Report Reveals Hidden Risks in Open Source Software Use
Chainguard's latest report analyzes over 1800 container image projects, revealing significant vulnerabilities in open source software, with 10,100 vulnerability instances and 154 unique CVEs tracked. Popular software like Python, Node, and nginx dominate usage, yet most vulnerabilities are found in less common "longtail" images, which constitute 61.42% of production workloads. Compliance requirements such as FIPS encryption drive the adoption of secure open source software, with 44% of customers using FIPS images in production. Despite the focus on popular images, 98% of CVEs were found in less popular images, indicating a broader risk landscape beyond the top 20 projects. Chainguard's remediation efforts show a swift average response time of less than 20 hours for Critical CVEs, emphasizing the importance of rapid vulnerability management. The report suggests that while engineering teams prioritize core projects, substantial security risks lie in the extensive array of dependencies they lack resources to manage. Chainguard aims to mitigate these risks by providing comprehensive coverage and remediation across the open source software supply chain, supporting organizations in managing widespread vulnerabilities.
Details
2026-01-08 11:43:44 theregister VULNERABILITIES Critical n8n Flaw Exposes 100,000 Servers to Remote Control Risks
A critical vulnerability in the n8n automation platform, tracked as CVE-2026-21858, allows unauthenticated remote code execution, impacting approximately 100,000 servers globally. The flaw, named "ni8mare," carries a maximum CVSS score of 10.0, enabling attackers to take full control of affected systems without needing credentials. n8n is widely used for automating workflows across various applications, making the flaw particularly dangerous due to its central role in managing sensitive data and access. The vulnerability stems from a "Content-Type Confusion" issue in webhook processing, allowing manipulation of HTTP headers to escalate attacks. Cyera researchers reported the issue to n8n on November 9, 2025, leading to a swift patch release on November 18, 2025, as part of version 1.121.0. Organizations are urged to update to the latest version immediately, as unpatched systems remain at high risk of exploitation, especially in self-hosted environments. The centralization of API credentials, database connections, and other sensitive information in n8n heightens the potential impact of a breach, posing significant operational risks.
Details
2026-01-08 11:05:56 theregister MALWARE AI-Powered "Vibe Coding" Tools Increasingly Used in Malware Development
Palo Alto Networks' Unit 42 reports growing use of AI-driven "vibe coding" tools in malware creation, posing new security challenges for organizations. AI models, while accelerating development, introduce vulnerabilities, including potential data exfiltration and prompt injection attacks, complicating security efforts. Criminals and state-sponsored actors are leveraging large language models (LLMs) to automate malware and social engineering tactics, though human oversight remains necessary. Errors in AI-generated code, such as incorrect file naming, can lead to ineffective attacks, providing a silver lining for defenders. Palo Alto Networks developed the "SHIELD" framework to help organizations implement security controls in AI-assisted coding environments. Many enterprises lack formal risk assessments or security controls for AI tools, increasing exposure to potential breaches and attacks. Recommendations include applying least privilege principles to AI tools and restricting usage to a single approved platform to mitigate risks.
Details
2026-01-08 11:05:56 theregister VULNERABILITIES OpenAI's ChatGPT Faces Persistent Vulnerabilities Despite Patches
Radware researchers identified ongoing vulnerabilities in OpenAI's ChatGPT, allowing exfiltration of personal data through indirect prompt injection attacks. Initial flaw, ShadowLeak, exploited AI's inability to differentiate between system instructions and malicious content, affecting services like Gmail and Google Drive. OpenAI's initial fix restricted ChatGPT's URL modification capabilities, but attackers bypassed this with a new method, ZombieAgent, using static URLs. ZombieAgent attack persists by exploiting ChatGPT's memory feature, allowing data exfiltration one character at a time, complicating defense efforts. OpenAI's attempts to block connectors and memory usage in the same session were circumvented, highlighting persistent structural weaknesses in AI platforms. Radware's findings stress the critical need for enterprises to gain visibility into AI agent actions and content interpretation to mitigate security risks. The vulnerabilities pose significant risks, including potential data leaks and incorrect decision-making, impacting sensitive systems and enterprise operations.
Details
2026-01-08 10:45:58 thehackernews VULNERABILITIES Cisco Releases Critical Patches for ISE Security Vulnerabilities
Cisco has issued updates to fix a medium-severity vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) following a public proof-of-concept exploit release. The vulnerability, identified as CVE-2026-20029 with a CVSS score of 4.9, affects the licensing feature and could expose sensitive information to authenticated, remote attackers with administrative privileges. The flaw arises from improper XML parsing in the web-based management interface, potentially allowing attackers to upload malicious files and access restricted operating system files. Cisco has acknowledged the discovery by Bobby Gould of Trend Micro Zero Day Initiative and confirmed no current exploitation in the wild, despite the availability of exploit code. In addition to this, Cisco addressed two other medium-severity bugs related to Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests, which could impact Snort 3 Detection Engine's availability. Users are advised to immediately update to the latest software versions to mitigate risks, as Cisco products are often targeted by cybercriminals. These updates underscore the ongoing need for vigilance and timely patch management to protect organizational assets from potential threats.
Details