Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11688

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-10-29 15:42:34 thehackernews MALWARE Surge in Botnet Attacks Exploiting PHP Servers and IoT Devices
Cybersecurity researchers report a surge in automated botnet attacks targeting PHP servers, IoT devices, and cloud gateways, leveraging botnets like Mirai, Gafgyt, and Mozi. Attacks exploit known CVE vulnerabilities and cloud misconfigurations, expanding botnet networks by compromising exposed systems, particularly those using WordPress and Craft CMS. PHP servers face significant risk due to misconfigurations, outdated plugins, and insecure file storage, creating a broad attack surface for threat actors. Attackers exploit debugging sessions in PHP environments, potentially extracting sensitive data if Xdebug is left active in production environments. Threat actors utilize cloud services like AWS, Google Cloud, and Microsoft Azure to obscure their origins, complicating detection and response efforts. Recommendations include updating devices, removing development tools from production, securing secrets, and restricting public cloud access to mitigate risks. Botnets are evolving beyond DDoS attacks, facilitating credential stuffing, password spraying, and evading geolocation controls, posing new challenges in identity security. The AISURU botnet, classified as TurboMirai, exemplifies advanced DDoS capabilities, leveraging consumer-grade devices for high-capacity attacks and illicit activities.
Details
2025-10-29 15:04:42 thehackernews VULNERABILITIES AI-Targeted Cloaking Attack Exploits AI Models for Misinformation
Cybersecurity researchers identified a new attack, AI-targeted cloaking, that manipulates AI models like ChatGPT by serving altered content to AI crawlers. This technique, a variant of search engine cloaking, uses user agent checks to deliver manipulated content, posing a significant misinformation risk. AI-targeted cloaking can distort AI outputs, influencing millions by presenting false information as verified facts, impacting trust in AI tools. The hCaptcha Threat Analysis Group found AI systems like ChatGPT Atlas and Perplexity Comet vulnerable, executing risky tasks and SQL injections without user prompts. Lack of robust safeguards in AI models makes them susceptible to exploitation, potentially allowing attackers to manipulate outputs and perform unauthorized actions. The findings underscore the need for enhanced security measures in AI systems to prevent misuse and protect user trust in AI-generated content.
Details
2025-10-29 14:15:04 bleepingcomputer VULNERABILITIES Enhancing Vulnerability Management with Centralized Control and Automation
Organizations face ongoing challenges in patch management due to complex environments, often leading to unaddressed vulnerabilities and increased risk exposure. Traditional patch management tools struggle with modern IT demands, lacking the ability to handle remote endpoints, cloud workloads, and third-party applications efficiently. Automated updates can cause inconsistent patch states and lack centralized oversight, complicating compliance and risk assessment efforts. Effective vulnerability management requires comprehensive visibility and control, enabling quick action and prioritization based on severity and exploitability. Action1 offers a cloud-native platform that streamlines detection, prioritization, and remediation, improving patch compliance and reducing remediation timelines. The platform provides real-time visibility, allowing for centralized management and automated patch deployment across diverse IT environments. Action1's analytics offer insights into patching trends, helping organizations refine policies and enhance security posture continuously. By bridging the gap between operations and security teams, Action1 fosters a coordinated workflow, enhancing both compliance and operational resilience.
Details
2025-10-29 12:53:53 theregister DATA BREACH Dentsu's Merkle Subsidiary Hit by Cyberattack, Sensitive Data Stolen
Dentsu's US subsidiary, Merkle, suffered a cyberattack resulting in the theft of sensitive data, including payroll and bank details, affecting current and former employees. The breach impacts Merkle's extensive workforce of over 16,000 employees across 80 global locations, with potential exposure of personal and financial information. Upon detecting unusual server activity, Dentsu activated incident response protocols, engaged a cybersecurity firm, and notified law enforcement and relevant regulatory bodies. Although Dentsu's public statement was vague, the shutdown of certain systems hints at a possible ransomware incident, though no group has claimed responsibility. Affected individuals are being offered complimentary dark-web monitoring services to mitigate risks of phishing and identity fraud from the exposed data. The incident underscores the importance of robust cybersecurity measures and highlights potential vulnerabilities in large, globally distributed organizations. Dentsu's proactive communication and response efforts aim to reassure affected employees and mitigate potential reputational damage.
Details
2025-10-29 12:01:11 thehackernews VULNERABILITIES BeyondTrust Predicts Identity-Based Cyber Threats to Surge by 2026
BeyondTrust's latest report forecasts a rise in identity-based cyber threats by 2026, emphasizing the need for robust identity management strategies. Agentic AI is identified as a major attack vector, with potential misuse of privileges due to inadequate cybersecurity measures during rapid integration. Account poisoning is expected to escalate, exploiting weaknesses in financial systems through automated fraudulent activities, posing significant risks to businesses. Ghost identities from past breaches remain a hidden threat, as outdated identity management practices leave organizations vulnerable to exploitation. The report advises implementing strict least privilege access controls and modern identity governance tools to mitigate these emerging threats. Organizations are urged to adopt an identity-first security posture, incorporating zero trust principles to safeguard both human and machine identities. The decline of VPNs as a secure remote access solution is noted, with threat actors increasingly exploiting these systems for persistent access.
Details
2025-10-29 11:54:57 thehackernews NATION STATE ACTIVITY Russian Hackers Exploit LotL Tactics Against Ukrainian Entities
Russian-origin threat actors targeted Ukrainian business and government entities, employing advanced living-off-the-land (LotL) tactics to access sensitive data and maintain network persistence. The attacks leveraged minimal malware and dual-use tools, reducing digital footprints and enhancing stealth, with web shells like LocalOlive facilitating next-stage payload delivery. Initial access was gained through unpatched vulnerabilities in public-facing servers, allowing attackers to execute PowerShell commands and perform regular memory dumps. Despite the use of tools linked to the Sandworm group, no direct evidence connects these intrusions to Sandworm, though the activity appears Russian in origin. The campaign reflects a broader trend of Russian cybercriminals decentralizing operations, pressured by state control and international law enforcement efforts. Recorded Future's analysis reveals Russian cybercriminals' evolving relationships with intelligence services, including data sharing and leveraging political connections for impunity. The Russian cybercriminal ecosystem is adapting to increased scrutiny, with operations fracturing under state influence and internal mistrust, impacting their operational dynamics.
Details
2025-10-29 11:48:32 theregister CYBERCRIME UK Trader Fined £200,000 for Sending Nearly 1M Spam Texts
The Information Commissioner's Office (ICO) fined Bharat Singh Chand £200,000 for sending 966,449 spam texts targeting financially vulnerable individuals in the UK. The messages, sent between December 2023 and July 2024, promoted debt solutions and energy-saving grants without proper sender identification. Chand's activities came under scrutiny during a separate investigation, revealing his involvement in a potential SIM farm operation. Despite denying involvement, evidence such as call scripts and WhatsApp messages linked Chand to the spam operation. The ICO received 19,138 complaints through the 7726 spam reporting service, leading to the significant penalty. Chand's appeal against the fine voided a potential 20% discount for early payment, increasing his financial liability. This case underscores the ICO's commitment to protecting consumers from unlawful marketing practices, particularly those exploiting vulnerable groups.
Details
2025-10-29 10:18:27 thehackernews MISCELLANEOUS AI Transforming Governance, Risk, and Compliance: Opportunities and Challenges
AI is revolutionizing Governance, Risk, and Compliance (GRC) by accelerating audits, identifying risks quicker, and reducing manual workload, enhancing efficiency and accuracy across operations. Despite its benefits, AI introduces challenges such as potential biases, blind spots, and regulatory gaps that are not yet fully addressed by governing bodies. The rapid pace of AI innovation is creating a gap between technological capabilities and the existing legal frameworks, posing immediate risk exposure for organizations. A free expert webinar titled "The Future of AI in GRC: Opportunities, Risks, and Practical Insights" aims to provide clarity and direction for organizations at various stages of AI adoption. The session promises actionable insights and practical advice to help organizations proactively integrate AI into their compliance strategies, turning potential risks into competitive advantages. Participants will gain a deeper understanding of AI's impact on GRC, preparing them to lead with confidence in an evolving regulatory landscape.
Details
2025-10-29 09:31:34 theregister MISCELLANEOUS UK Government Seeks New CTO to Overhaul Digital Strategy
The UK government is recruiting a new Chief Technology Officer (CTO) to address a £23 billion technology overhaul, following the departure of David Knott for family reasons. The role offers a starting salary between £100,000 and £162,500, with external candidates expected to start at the lower end, despite competitive market rates. The CTO position is part of the Government Digital Service within the Department for Science, Innovation and Technology, tasked with modernizing the digital landscape. A recent report indicates that digital, data, and technology professionals constitute only 4.5% of the UK civil service, highlighting a significant talent gap. The Public Accounts Committee noted that pay constraints hinder government departments from competing with the private sector for top digital talent. The new CTO will play a pivotal role in aligning digital strategies across government departments to achieve a cohesive digital transformation. The National Audit Office reported a £3 billion increase in costs due to delays in digital transformation, emphasizing the need for effective leadership in this role.
Details
2025-10-29 08:37:26 thehackernews MALWARE Malicious npm Packages Target Developer Credentials Across Multiple Platforms
Ten malicious npm packages were discovered, targeting developer credentials on Windows, macOS, and Linux systems, with over 9,900 downloads since their upload on July 4, 2025. The packages impersonate popular libraries such as TypeScript and discord.js, using typosquatting to deceive developers into downloading them. Upon installation, a postinstall hook triggers a script that executes an obfuscated payload, launching the malware in a new terminal window to avoid detection. The malware uses four layers of obfuscation, including XOR cipher and URL encoding, to conceal its operations and resist analysis. It captures the victim's IP address and downloads a 24MB PyInstaller-packaged information stealer that harvests credentials from system keyrings and browsers. The stolen credentials, including those from email clients, cloud storage, and VPN connections, are compressed and sent to an external server, risking unauthorized access to sensitive corporate resources. Developers are advised to scrutinize npm package sources and monitor for unusual terminal activity during installations to mitigate such threats.
Details
2025-10-29 08:05:53 theregister VULNERABILITIES German Exchange Servers at Risk Due to Outdated Software Usage
Germany's cybersecurity agency (BSI) reports that 92% of Exchange servers are running unsupported software, risking network security and operational integrity. Microsoft's support for Exchange Server 2016 and 2019 ended on October 14, leaving many organizations vulnerable to unpatched security flaws. Affected entities include critical sectors such as hospitals, schools, social services, and local authorities, potentially impacting essential services. The BSI warns that outdated servers could lead to severe network compromises, data leaks, ransomware attacks, and extended operational downtime. Microsoft offers a six-month Extended Update Program, but post-April 2024, organizations must upgrade or secure their systems independently. The BSI advises restricting Exchange Server access to trusted IPs or using VPNs to mitigate exposure to potential threats. Historical vulnerabilities like ProxyShell and ProxyLogon serve as reminders of the consequences of unpatched Exchange systems.
Details
2025-10-29 07:49:55 thehackernews VULNERABILITIES CISA Alerts on Critical Flaws in Dassault and XWiki Under Attack
CISA and VulnCheck report active exploitation of critical vulnerabilities in Dassault Systèmes DELMIA Apriso and XWiki, urging immediate attention to patching these flaws. The vulnerabilities, CVE-2025-6204 and CVE-2025-6205, affect DELMIA Apriso versions from 2020 to 2025, with patches released in early August. A previous flaw in the same product, CVE-2025-5086, was flagged for exploitation shortly after detection by the SANS Internet Storm Center. VulnCheck identifies a two-stage attack chain using CVE-2025-24893 to deploy a cryptocurrency miner, with initial exploitation attempts traced back to March 2025. Attack traffic originates from a Vietnamese IP, previously flagged for malicious activity, emphasizing the need for robust network monitoring. Users are advised to apply updates promptly, with FCEB agencies mandated to remediate DELMIA Apriso vulnerabilities by November 18, 2025. This incident underscores the critical importance of timely patch management and continuous threat monitoring to mitigate exploitation risks.
Details
2025-10-29 03:51:29 theregister CYBERCRIME Australian Police Develop AI to Combat Online Crime Influencers
Australia's Federal Police (AFP) is creating an AI tool to decode emojis and slang used by Gen Z and Gen Alpha in criminal communications, aiming to tackle decentralized online crime networks. These networks, termed "crimefluencers," are involved in violent extremism and sadistic online exploitation, often targeting pre-teen and teenage girls. The AFP identified 59 alleged offenders, leading to nine international and three domestic arrests, with those arrested in Australia aged between 17 and 20. A Five Eyes Law Enforcement Group sub-team, including Australia, the UK, USA, Canada, and New Zealand, has been formed to address these criminal activities. The AFP's anti-terrorism efforts have investigated 48 youths since 2020, charging 25 with terrorism-related offenses, highlighting the role of social media in radicalization. In a separate operation, the AFP recovered $9 million in cryptocurrency by deciphering a crypto wallet's recovery seed phrase, showcasing innovative forensic capabilities. The AFP collaborates with Sydney’s University of Technology to study how smart devices can determine the time of death, enhancing forensic investigations in natural disasters or foul play cases.
Details
2025-10-28 23:36:59 bleepingcomputer VULNERABILITIES Microsoft Releases Windows 11 Update with Enhanced Administrator Protection
Microsoft has rolled out the KB5067036 update for Windows 11, introducing the Administrator Protection feature to enhance system security by requiring identity verification for administrative actions. This optional update, part of the non-security preview schedule, allows users to test new features before the official Patch Tuesday release, impacting Windows 11 24H2 and 25H2 versions. Administrator Protection aims to mitigate risks from malicious software by demanding Windows Hello authentication for actions needing administrative privileges, such as software installation and system settings changes. The update also addresses several technical issues, including bugs affecting the Media Creation Tool, HTTP/2 connections, and Kerberos Key Distribution Center service on server domain controllers. A redesigned Start Menu is being gradually introduced, offering new categories, grid views, and a responsive layout to improve user experience and accessibility. Organizations are encouraged to consider enabling the Administrator Protection feature to bolster defenses against unauthorized system changes and potential malware threats. The update is available for manual installation via Windows Update settings or the Microsoft Update Catalog, with no known issues reported at this time.
Details
2025-10-28 21:17:09 bleepingcomputer DATA BREACH Dentsu's Merkle Subsidiary Experiences Significant Data Breach Incident
Dentsu's U.S.-based subsidiary, Merkle, experienced a cybersecurity breach affecting staff and client data, prompting immediate system shutdowns as a precautionary measure. The breach led to the exposure of sensitive information, including bank details, payroll data, and personal contact information of employees and clients. Dentsu has engaged third-party incident response services to assess the breach's scale and impact, with ongoing investigations to determine the full extent of data compromised. The company has informed relevant authorities in affected countries in compliance with legal requirements and is notifying impacted individuals. Despite the breach, Dentsu's Japan-based network systems remain unaffected; however, the incident is anticipated to have some financial repercussions. No ransomware group has claimed responsibility for the attack, and the investigation continues to identify the perpetrators. The incident underscores the importance of robust cybersecurity measures and proactive incident response strategies to mitigate potential damages.
Details