Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11688

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-10-31 05:26:12 theregister MISCELLANEOUS European Central Bank Advances Digital Euro Initiative for 2029 Launch
The European Central Bank (ECB) announced plans to introduce a Digital Euro by 2029, aiming to modernize currency and enhance payment sovereignty within the Eurozone. ECB President Christine Lagarde emphasized the importance of digital currency as a public good, aligning with the evolving financial landscape where physical banknotes are less favored. Currently, two-thirds of digital payments in the Euro area are processed by non-European companies, highlighting a dependency the ECB seeks to reduce through this initiative. The Digital Euro will provide a standardized infrastructure, enabling European banks to compete more effectively across the continent and potentially increase their market share in digital payments. A pilot program is scheduled for 2027, with the ECB investing €1.3 billion in development and projecting annual operating costs of €320 million. Concerns about privacy and security are prevalent, as critics warn that digital currencies could lead to increased surveillance and potential restrictions on consumer freedoms. The ECB aims to address these challenges by ensuring robust security measures and transparent policies to protect user data and maintain public trust.
Details
2025-10-31 03:38:21 thehackernews VULNERABILITIES ThreatLocker Launches macOS Tool to Address Configuration Weaknesses
ThreatLocker has introduced Defense Against Configurations (DAC) for macOS, aimed at identifying and mitigating configuration vulnerabilities that often go unnoticed. The tool scans macOS devices up to four times daily, identifying risky settings and providing remediation guidance aligned with frameworks like CIS, NIST, and ISO 27001. Configuration oversights, such as outdated protocols and permissive settings, pose significant risks, especially in creative industries heavily reliant on Mac devices. The DAC tool extends the security visibility that Windows users enjoy to macOS, helping organizations close security gaps before they are exploited. By integrating with existing ThreatLocker policies, DAC aids in aligning security practices with compliance requirements and insurance standards. The Beta version focuses on high-value controls, ensuring a streamlined path from discovery to remediation without overwhelming IT teams with alerts. This initiative underscores the importance of configuration management as a critical component of cybersecurity posture, particularly for organizations using diverse operating systems.
Details
2025-10-30 20:19:54 bleepingcomputer MALWARE Surge in NFC Relay Malware Targets European Android Users
Researchers identified over 760 malicious Android apps using NFC relay techniques to steal payment card information across Eastern Europe, with significant activity noted in Poland, Czech Republic, and Russia. This malware exploits Android's Host Card Emulation (HCE) to emulate or capture contactless credit card data, enabling unauthorized transactions without the physical cardholder's presence. Zimperium, a mobile security firm, reported the malware's rapid expansion, supported by over 70 command-and-control servers and distribution hubs, as well as Telegram channels for data exfiltration. The malware often disguises itself as legitimate apps, such as Google Pay or various financial institutions, increasing the risk of unsuspecting users downloading harmful software. Android users are advised to only download apps from trusted sources, regularly use Play Protect for scanning, and disable NFC when not in use to mitigate risks. The ongoing proliferation of NFC relay malware signals a growing threat landscape, necessitating heightened vigilance and robust security measures for mobile users in affected regions.
Details
2025-10-30 20:05:24 bleepingcomputer VULNERABILITIES CISA Mandates Urgent Patching of VMware Tools Vulnerability
CISA has directed U.S. federal agencies to patch a critical VMware Tools flaw, CVE-2025-41244, exploited by Chinese hackers to escalate privileges on virtual machines. The vulnerability, affecting VMware Aria Operations and VMware Tools, allows attackers with local access to gain root-level control, posing significant risks to federal systems. Federal agencies have until November 20 to implement patches as per Binding Operational Directive 22-01, with CISA urging all organizations to prioritize remediation. The flaw has been actively exploited since mid-October 2024 by the Chinese state-sponsored group UNC5174, known for targeting U.S. defense contractors and other international entities. UNC5174, identified as a contractor for China's Ministry of State Security, has a history of exploiting various vulnerabilities to breach high-profile targets. Broadcom has released patches for several VMware zero-day vulnerabilities this year, emphasizing the need for timely updates to protect against sophisticated cyber threats. Organizations are advised to apply vendor-recommended mitigations or cease using affected products if solutions are unavailable, to safeguard against potential breaches.
Details
2025-10-30 19:27:48 theregister NATION STATE ACTIVITY Chinese Cyber Espionage Targets European Diplomats with Windows Flaw
Chinese government-linked group UNC6384 exploited an unpatched Windows vulnerability to target European diplomats, aiming to steal defense and national security information. The espionage campaign utilized social engineering and a Windows shortcut flaw to deploy PlugX malware at diplomatic conferences in September and October 2025. Attackers used phishing emails with European defense-themed lures, delivering weaponized LNK files exploiting CVE-2025-9491, a Windows shortcut vulnerability. The attack chain involved DLL sideloading, leveraging an expired Canon printer utility with a valid digital signature to bypass security tools. PlugX malware, a Remote Access Trojan, enabled remote command execution, keylogging, file transfers, and persistent system access. Microsoft has yet to address the vulnerability, first reported in March, which has been exploited by multiple state-sponsored groups since 2017. This campaign indicates a strategic shift by UNC6384 from Southeast Asia to European targets, demonstrating rapid adoption of disclosed vulnerabilities.
Details
2025-10-30 19:06:20 bleepingcomputer NATION STATE ACTIVITY Ribbon Communications Breach Linked to Nation-State Hackers
Ribbon Communications, a key telecom services provider, reported a breach by nation-state hackers, impacting its IT network since December 2024. The breach affects Ribbon's global operations, including services to critical infrastructure and government entities like the U.S. Department of Defense. Preliminary investigations indicate unauthorized access to customer files on two laptops, though no material information theft is confirmed. Ribbon is collaborating with cybersecurity experts and federal law enforcement to investigate and mitigate the breach. The company anticipates additional costs in Q4 2025 for breach investigation and network fortification, but these are not expected to be substantial. The attack shares characteristics with previous telecom breaches attributed to China's Salt Typhoon cyber-espionage group. This incident underscores the persistent threat of state-sponsored cyber activities targeting critical infrastructure sectors.
Details
2025-10-30 18:53:32 theregister DATA BREACH Proton Launches Platform to Expose Unreported Data Breaches
Proton has introduced the Data Breach Observatory, a platform aimed at revealing data breaches that organizations have not publicly disclosed. This service focuses on breaches identified through dark web monitoring, bypassing traditional disclosure methods like GDPR notifications or journalistic investigations. The Observatory initially reports on 794 attacks in 2025, affecting 300 million records, excluding aggregated infostealer dumps to maintain accuracy. Proton's initiative seeks to enhance transparency and assist small and medium businesses in understanding and mitigating data breach risks. The platform employs cross-referencing and metadata analysis, partnering with Constella Intelligence to ensure data accuracy and reliability. By responsibly disclosing breaches, Proton aims to fill the gap left by organizations that delay or avoid breach announcements. The service distinguishes itself by providing near-real-time updates, offering a systematic approach to monitoring criminal sources directly.
Details
2025-10-30 18:44:45 bleepingcomputer DATA BREACH Conduent Data Breach Exposes Sensitive Information of 10.5 Million Individuals
Conduent, a major BPO provider, confirmed a data breach affecting over 10.5 million individuals, with the largest impact reported in Oregon. The breach, initially discovered in January 2025, was traced back to an incident beginning in October 2024, highlighting prolonged exposure. Exposed data includes names, Social Security Numbers, birth dates, health insurance details, and medical information, raising significant privacy concerns. No misuse of the stolen data has been reported as of late October 2025, though the potential for future exploitation remains. Conduent faced a cybersecurity incident earlier in 2025, claimed by the Safepay ransomware group, which disrupted services and led to data theft. Affected individuals are advised to monitor credit reports and consider fraud alerts, though no complimentary identity protection services are offered. The breach underscores the critical need for robust cybersecurity measures and timely incident response to protect sensitive data.
Details
2025-10-30 18:07:47 bleepingcomputer VULNERABILITIES WhatsApp Introduces Passwordless Chat Backup Encryption for Enhanced Security
WhatsApp is launching passkey-encrypted backups on iOS and Android, allowing users to secure chat history using biometrics or screen lock codes instead of traditional passwords. This new feature utilizes passkeys, a passwordless authentication method, enhancing security by generating a cryptographic key pair unique to each device. The private key remains on the user's device, preventing theft during data breaches, while the public key is shared with the app or website. Users can activate this security measure by navigating to WhatsApp settings, then selecting Chats > Chat backup > End-to-end encrypted backup. The global rollout of this feature is underway, expected to reach all users over the next few weeks and months. WhatsApp first introduced end-to-end encrypted chat backups in 2021, allowing storage on iCloud for iOS and Google Drive for Android. The implementation of passkeys aligns with WhatsApp's ongoing efforts to enhance user privacy and protect against potential scams.
Details
2025-10-30 17:06:33 thehackernews CYBERCRIME Google's AI Shields Android Users from 10 Billion Monthly Scam Messages
Google reports its AI-driven defenses on Android block over 10 billion scam calls and messages monthly, enhancing user protection globally against malicious communications. The company has successfully blocked more than 100 million suspicious numbers from using Rich Communication Services, preventing scams before they reach users. New safety features in Google Messages warn users of potentially harmful links, aiming to reduce the risk of phishing attacks and data theft. Analysis reveals employment fraud as the most common scam type, targeting job seekers with fake opportunities to steal personal and financial information. Scammers increasingly use group chats to appear legitimate, incorporating fellow scammers to validate fraudulent messages and deceive recipients. Scam messages follow a distinct schedule, peaking on Mondays during work hours, exploiting users' busy routines to increase the likelihood of engagement. The scams employ tactics like "Spray and Pray" for broad targeting or "Bait and Wait" for personalized attacks, both aiming to steal information or money. Google's efforts highlight the ongoing battle against evolving scam tactics and the necessity for continuous adaptation in cybersecurity measures.
Details
2025-10-30 16:43:54 thehackernews CYBERCRIME Russian Ransomware Gangs Exploit AdaptixC2 for Sophisticated Attacks
AdaptixC2, an open-source command-and-control framework, is increasingly used by Russian ransomware groups for advanced cyberattacks, raising concerns over its misuse beyond ethical penetration testing. Originally intended for red teaming, AdaptixC2 offers features like encrypted communications and remote terminal access, making it attractive for cybercriminals seeking comprehensive control over compromised systems. Palo Alto Networks Unit 42 identified the framework's use in fake help desk scams via Microsoft Teams and AI-generated PowerShell scripts, highlighting its versatility in cybercrime operations. Silent Push's investigation linked AdaptixC2's creator, "RalfHacker," to Russia's criminal underground, using platforms like Telegram to promote the tool, which has amassed over 28,000 subscribers. The tool's adoption by groups associated with Fog and Akira ransomware operations, alongside initial access brokers, signals a growing trend of leveraging open-source tools for malicious purposes. While no direct involvement of RalfHacker in criminal activities has been confirmed, the tool's increasing use by threat actors necessitates heightened vigilance and monitoring. Organizations are advised to strengthen defenses against post-exploitation tools like AdaptixC2, focusing on detection and response strategies to mitigate potential threats.
Details
2025-10-30 16:43:54 bleepingcomputer CYBERCRIME Ex-L3Harris Executive Admits Selling Cyber Exploits to Russian Broker
Peter Williams, former L3Harris executive, pleaded guilty to selling U.S. defense cyber exploits to a Russian broker between 2022 and 2025. The stolen components, valued at $35 million, were intended for exclusive use by the U.S. government and allies, posing a significant national security risk. Williams received $1.3 million in cryptocurrency for the trade secrets, which included sensitive cyber-exploit components. The Russian broker, potentially linked to Operation Zero, resells cyber exploits, including to the Russian government. Williams faces up to 10 years in prison and fines up to $250,000 or twice the financial impact of his actions. L3Harris Trenchant is investigating potential leaks of Google Chrome zero-day vulnerabilities, with another employee under scrutiny. The case underscores the critical need for robust insider threat detection and management within defense contractors.
Details
2025-10-30 16:32:56 theregister VULNERABILITIES Critical Docker Compose and Windows Installer Vulnerabilities Addressed
A path traversal vulnerability in Docker Compose, identified as CVE-2025-62725, was discovered by Imperva's Ron Masas, receiving a severity rating of 8.9 from NIST. The flaw allowed attackers to write arbitrary files on the host system by exploiting OCI-based Compose artifacts, posing a significant risk to millions of workflows. Docker's quick response included a patch in version v2.40.2, emphasizing the importance of sanitizing paths even in seemingly simple configurations like YAML. A separate DLL hijack vulnerability in Docker's Windows Installer, rated 8.8 by ENISA, was also patched, preventing unauthorized system access via malicious DLL files. Users are advised to upgrade to Docker Desktop 4.49.0 to mitigate the DLL hijacking risk, with future releases requiring updated Windows versions. These incidents highlight the critical need for continuous updates and vigilance in maintaining secure software environments, as Docker addresses multiple high-severity flaws. The situation serves as a reminder of OWASP's guidance to keep both host systems and Docker installations current to minimize security risks.
Details
2025-10-30 16:15:34 bleepingcomputer VULNERABILITIES CISA and NSA Issue Guidelines to Secure Microsoft Exchange Servers
CISA and NSA, with international partners, released guidance to secure Microsoft Exchange servers against potential cyber threats, focusing on hardening authentication and minimizing attack surfaces. Recommendations include decommissioning outdated servers, transitioning to Microsoft 365, and implementing multifactor authentication and zero trust principles to enhance security posture. Agencies advise maintaining up-to-date systems, migrating from unsupported versions, and employing emergency mitigation services to prevent exploitation of vulnerabilities. Technical measures suggested involve enabling Kerberos and SMB for secure authentication, configuring Transport Layer Security, and implementing HTTP Strict Transport Security for secure connections. The advisory follows an emergency directive addressing a critical Microsoft Exchange vulnerability (CVE-2025-53786) that could lead to domain compromise if exploited. Recent findings revealed over 29,000 servers remain vulnerable, underscoring the urgency for organizations to adopt the recommended security measures. State-backed and financially motivated groups have historically exploited Exchange vulnerabilities, emphasizing the need for robust defensive strategies.
Details
2025-10-30 14:49:39 thehackernews VULNERABILITIES New "Brash" Exploit Crashes Chromium Browsers Using Malicious URL
A critical flaw in Chromium's Blink engine, named "Brash," can crash browsers like Chrome and Edge in seconds via a malicious URL. Security researcher Jose Pino discovered the vulnerability, which exploits uncontrolled "document.title" API updates, overwhelming browsers with DOM mutations. The exploit can be programmed to trigger at precise times, acting as a logic bomb and evading initial detection. Impacted browsers include Chrome, Edge, Brave, Opera, and others based on Chromium, while Firefox and Safari remain unaffected. The exploit significantly degrades system performance by consuming CPU resources, posing operational challenges. Google has been contacted for comment and potential patching plans, but no official response has been provided yet. Organizations using Chromium-based browsers should monitor developments and prepare for potential updates or mitigations.
Details