Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11700

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-10-22 10:35:14 theregister CYBERCRIME Jaguar Land Rover Cyberattack Costs UK Nearly £2 Billion
Jaguar Land Rover suffered a major cyberattack in August 2025, impacting IT systems and halting manufacturing operations across multiple UK plants. The Cyber Monitoring Centre estimates the financial impact of the incident at £1.9 billion, potentially the most costly in UK history. Over 5,000 organizations were affected, with disruptions extending to JLR's supply chain and dealership networks. The UK government intervened with £1.5 billion in financial support to aid JLR's recovery efforts, highlighting the incident's severity. JLR's manufacturing losses reached approximately £108 million weekly, with full production expected to resume by January 2026. The attack's details remain undisclosed, but the decision to halt operations suggests significant system compromise. This incident emphasizes the critical need for robust cyber resilience strategies within the UK's industrial sector.
Details
2025-10-22 10:25:22 bleepingcomputer NATION STATE ACTIVITY Chinese Hackers Exploit SharePoint Vulnerability in Global Cyber Campaign
Chinese threat groups exploited the ToolShell vulnerability (CVE-2025-53770) in Microsoft SharePoint, impacting government, telecom, finance, and academic sectors across four continents. The flaw, disclosed as a zero-day on July 20, allows remote code execution and file system access on on-premise SharePoint servers. Microsoft issued emergency patches on July 21, addressing this bypass of previously known vulnerabilities CVE-2025-49706 and CVE-2025-49704. Symantec reports that the attacks involved webshells, a Go-based backdoor, and the ShadowPad Trojan, leveraging legitimate software for side-loading. Credential dumping and domain compromise were achieved using tools like ProcDump and PetitPotam, indicating sophisticated tactics for persistence and data exfiltration. The campaign's scale suggests a broader involvement of Chinese threat actors than initially identified, raising concerns over state-sponsored cyber espionage. Organizations are advised to apply Microsoft's updates promptly and enhance monitoring for unusual activity linked to these attack vectors.
Details
2025-10-22 09:32:16 thehackernews VULNERABILITIES Transitioning from Passwords to Passphrases Enhances Security Posture
Recent guidance recommends shifting from complex passwords to longer passphrases, prioritizing length over complexity to enhance security against brute-force attacks. Traditional 8-character complex passwords are vulnerable to modern GPU setups, which can crack them in months. Passphrases offer significantly higher entropy. Passphrases, composed of random common words, improve memorability and reduce the need for frequent password resets, decreasing helpdesk support demands. The National Institute of Standards and Technology (NIST) advises focusing on password length rather than complexity, aligning with current best practices. Implementing passphrases requires organizational change management, including pilot programs and gradual enforcement to minimize user resistance. Tools like Specops Password Policy can facilitate this transition by supporting self-service password resets and auditing password strength against compromised databases. While passphrases enhance security, they should complement multifactor authentication (MFA) and ongoing credential monitoring for comprehensive protection.
Details
2025-10-22 09:00:57 thehackernews NATION STATE ACTIVITY Kaspersky Identifies PassiveNeuron APT Targeting Global Organizations
Kaspersky researchers have uncovered PassiveNeuron, an APT campaign targeting government, financial, and industrial sectors across Asia, Africa, and Latin America. The campaign utilizes advanced malware families, Neursite and NeuralExecutor, to compromise internal servers and evade detection through sophisticated command-and-control tactics. Threat actors employ a plugin-based approach, enabling dynamic adaptation and lateral movement within compromised networks, even affecting isolated systems. Initial access is achieved via Windows Server vulnerabilities, with attackers deploying web shells and advanced implants to maintain persistence. The campaign remains unattributed, though indicators suggest potential involvement of Chinese-speaking threat actors. PassiveNeuron's focus on server machines highlights the ongoing risk posed by exposed infrastructure to sophisticated cyber espionage activities. Organizations are advised to enhance security measures for server environments, particularly those exposed to the internet, to mitigate potential threats.
Details
2025-10-22 07:24:16 theregister DATA BREACH UK Data Regulator Opts Out of MoD Afghan Breach Investigation
The UK's Information Commissioner's Office (ICO) decided against investigating a Ministry of Defence data breach that endangered thousands of Afghans linked to British forces. The breach, costing an estimated £850 million, involved a spreadsheet with over 33,000 lines of sensitive data, including Afghan resettlement applicants' details. The breach was inadvertently caused by sharing a dataset with hidden cells containing additional sensitive information, discovered only after a superinjunction was lifted. ICO Commissioner John Edwards stated that an investigation might have disrupted the Ministry of Defence's efforts to address the breach and protect affected individuals. The ICO was informed of the breach's details and was satisfied with the Ministry's response, focusing on rectifying the issue and safeguarding those at risk. The ICO's decision was influenced by resource constraints, as the department lacked sufficient vetted staff to handle classified information incidents. In response, the ICO urged a joint effort with the Cabinet Office and DSIT to enhance public sector data protection, with plans to improve standards by year-end. The incident follows a previous breach by the UK's Afghan Relocations and Assistance Policy, which resulted in a £350,000 fine after failing to BCC email recipients.
Details
2025-10-22 07:10:08 thehackernews VULNERABILITIES Critical Flaw in Async-Tar Library Could Lead to Remote Code Execution
A high-severity flaw, CVE-2025-62518, in the async-tar Rust library could enable remote code execution, affecting projects like testcontainers and wasmCloud. The vulnerability, dubbed TARmageddon, allows file overwriting attacks, potentially replacing configuration files or hijacking build backends. The flaw stems from inconsistent parsing of PAX and ustar headers in TAR archives, allowing attackers to smuggle additional archive entries. Tokio-tar, a fork of async-tar, is particularly vulnerable due to its status as abandonware, with no recent updates since July 2023. Users are advised to migrate to astral-tokio-tar, which has released version 0.5.6 to address the boundary parsing vulnerability. The issue highlights the need for vigilance against logic flaws in software development, even in languages like Rust known for memory safety. Organizations using affected libraries should prioritize updates to mitigate potential exploitation and ensure system integrity.
Details
2025-10-22 04:40:00 thehackernews VULNERABILITIES TP-Link Releases Critical Security Patches for Omada Gateways
TP-Link issued patches for four security vulnerabilities in Omada gateway devices, including two critical flaws allowing potential remote code execution. The vulnerabilities could enable attackers to execute arbitrary commands on the device's operating system, posing significant security risks. Affected product models and versions are detailed in TP-Link's advisory, urging users to update their firmware immediately. While there's no evidence of these vulnerabilities being actively exploited, users are advised to act swiftly to mitigate potential threats. TP-Link recommends verifying device configurations post-update to ensure settings remain secure and aligned with user preferences. The company disclaims responsibility for any issues arising from failure to implement the recommended firmware updates. This situation highlights the importance of timely patch management to protect network infrastructure from emerging threats.
Details
2025-10-21 22:30:47 bleepingcomputer MALWARE Vidar Stealer 2.0 Enhances Data Theft and Evasion Techniques
Vidar Stealer 2.0 has been released with significant upgrades, including multi-threading, improved data theft capabilities, and advanced evasion techniques, posing increased risks to businesses and individuals. The malware targets a wide array of data sources, such as browser cookies, cryptocurrency wallets, cloud credentials, and popular platforms like Steam, Telegram, and Discord. Vidar 2.0 employs sophisticated methods to bypass Chrome's AppBound encryption, extracting keys from active memory and communicating them via named pipes to avoid detection. The release coincides with a decline in Lumma Stealer activity, positioning Vidar 2.0 as a potential leader in the info-stealer market due to its advanced features and competitive pricing. Trend Micro reports a spike in Vidar activity, predicting its increased prevalence in cyber campaigns through Q4 2025, driven by its technical capabilities and developer reputation. Organizations should enhance their cybersecurity measures to detect and mitigate the risks posed by this advanced malware, focusing on browser security and data protection strategies.
Details
2025-10-21 21:15:09 bleepingcomputer VULNERABILITIES TP-Link Omada Gateways Face Critical Command Injection Vulnerabilities
TP-Link has identified two critical command injection vulnerabilities in Omada gateway devices, impacting small to medium businesses using these popular full-stack solutions. The vulnerabilities, CVE-2025-6542 and CVE-2025-6541, allow arbitrary OS command execution, with the former being remotely exploitable without authentication. Thirteen Omada gateway models are affected, with specific firmware versions requiring updates to mitigate these risks. Exploitation could lead to full system compromise, data theft, and unauthorized lateral movement within networks. TP-Link has released firmware updates and advises users to apply these patches promptly and verify device configurations post-update. Additional vulnerabilities, CVE-2025-8750 and CVE-2025-7851, also affect the same models, potentially granting root access under certain conditions. The latest firmware release addresses all identified vulnerabilities, emphasizing the importance of timely patch management for cybersecurity resilience.
Details
2025-10-21 19:18:49 bleepingcomputer VULNERABILITIES CISA Urges Patching of Exploited Oracle E-Business Suite Flaw
CISA has confirmed that the Oracle E-Business Suite vulnerability CVE-2025-61884 is actively exploited, prompting its inclusion in the Known Exploited Vulnerabilities catalog. The SSRF flaw in Oracle's Configurator runtime component allows unauthorized access to critical data, with a severity rating of 7.5. Federal agencies are mandated to patch this vulnerability by November 10, 2025, to mitigate potential security breaches. The vulnerability was linked to exploits leaked by ShinyHunters and the Scattered Lapsus$ group, although Oracle initially did not disclose its exploitation. Investigations by Mandiant and CrowdStrike revealed that Oracle EBS was targeted in two separate campaigns, involving the Clop ransomware gang. Oracle's patch for CVE-2025-61884 addresses the flaw by validating the "return_url" parameter to block unauthorized requests. Oracle's communication on the issue has been questioned, as the ShinyHunters exploit was incorrectly listed as an IOC for a different CVE. This incident underscores the importance of timely patching and clear communication from vendors to prevent exploitation of known vulnerabilities.
Details
2025-10-21 19:02:43 bleepingcomputer VULNERABILITIES Developers at Risk: Chromium Vulnerabilities in Popular IDEs Exposed
Ox Security identified over 94 vulnerabilities in Cursor and Windsurf IDEs, affecting approximately 1.8 million developers using outdated Chromium and V8 engines. These vulnerabilities stem from older versions of the Electron framework, which are not updated to patch known security flaws. A proof-of-concept exploit demonstrated the potential for denial-of-service attacks and arbitrary code execution using CVE-2025-7656. Despite responsible disclosure, Cursor deemed the issue "out of scope," while Windsurf did not respond, leaving users exposed to potential threats. Attack vectors include malicious extensions, phishing attacks, and poisoned repositories, which could lead to severe exploitation scenarios. The vulnerabilities do not affect the latest Visual Studio Code, which receives regular updates to address security issues. The situation underscores the importance of timely software updates to mitigate risks associated with known vulnerabilities.
Details
2025-10-21 17:09:55 bleepingcomputer VULNERABILITIES Pwn2Own Ireland 2025 Unveils 34 Zero-Day Exploits on Day One
Pwn2Own Ireland 2025's first day saw researchers exploit 34 zero-day vulnerabilities, distributing $522,500 in cash rewards to participants for their discoveries. Team DDOS captured attention by chaining eight zero-day flaws to breach a QNAP router and NAS device, earning $100,000 and securing second place on the leaderboard. Synacktiv Team and others gained root access on various devices, including Synology and QNAP systems, with individual awards of $40,000 each for their successful exploits. STARLabs and other teams targeted the Canon imageCLASS printer and Sonos smart speaker, collectively earning $90,000 for their successful hacks. The Zero Day Initiative (ZDI) coordinates responsible disclosure, giving vendors 90 days to patch vulnerabilities before public disclosure, ensuring proactive security measures. The event includes expanded attack vectors, such as USB port exploitation in mobile devices, alongside traditional methods like Bluetooth and Wi-Fi. Meta, QNAP, and Synology co-sponsor the contest, offering a $1 million reward for a zero-click WhatsApp exploit, emphasizing the importance of securing communication apps. ZDI's upcoming events, including Pwn2Own Automotive in Tokyo, continue to drive innovation in identifying and addressing security vulnerabilities across various technologies.
Details
2025-10-21 15:22:13 bleepingcomputer NATION STATE ACTIVITY Russian ColdRiver Group Adopts New Malware in Espionage Campaigns
The Russian state-backed ColdRiver group, also known as Star Blizzard, has introduced new malware families, NOROBOT and MAYBEROBOT, in their latest cyber-espionage efforts. ColdRiver's operations target Western governments, journalists, think tanks, and NGOs, focusing on data exfiltration and intelligence gathering. New malware deployment begins with ClickFix social engineering attacks, using fake CAPTCHA challenges to deliver malicious payloads. NOROBOT, initially delivered as a DLL, gains persistence through registry modifications and scheduled tasks, evolving to deploy a PowerShell backdoor, MAYBEROBOT. MAYBEROBOT supports limited commands and sends execution results to distinct C2 paths, indicating a focus on operational feedback and refinement. The group has shifted from complex to simplified, then back to complex delivery chains, complicating detection and analysis. Despite exposure and countermeasures, ColdRiver remains active, leveraging sophisticated tactics to maintain its espionage capabilities. Google Threat Intelligence Group provides indicators of compromise and YARA rules to aid defenders in detecting these advanced threats.
Details
2025-10-21 15:12:26 thehackernews CYBERCRIME Meta Enhances Security Measures Against Scams on WhatsApp and Messenger
Meta has introduced new security features for WhatsApp and Messenger to protect users from scams, including screen-sharing warnings and scam detection settings. WhatsApp now warns users attempting to share screens with unknown contacts during video calls, aiming to prevent sharing sensitive information like bank details. Messenger users can activate "Scam detection" to receive alerts about potentially suspicious messages from unknown contacts, with an option for AI review. Meta's efforts have led to the removal of over 21,000 Facebook Pages and accounts impersonating customer support to steal personal information. Since the beginning of the year, Meta has disrupted nearly 8 million accounts linked to scam centers targeting individuals globally, including the elderly. These scams, often originating from Southeast Asia, involve cybercrime syndicates using psychological manipulation and romance baiting to defraud victims. Victims are lured into bogus investment opportunities, frequently involving cryptocurrencies, resulting in significant financial losses. Meta's proactive measures aim to safeguard users while maintaining end-to-end encryption, though AI-reviewed messages lose this encryption temporarily.
Details
2025-10-21 15:03:13 theregister MISCELLANEOUS Aligning Cyber Risk Management with Business Objectives for Resilience
Many organizations report rising cyber risk levels despite increased security investments, with only six percent seeing a decrease, according to the Qualys State of Cyber Risk Report. A significant misalignment exists between cyber risk programs and business objectives, with less than a third of programs effectively integrated into business strategies. Siloed tools, conflicting priorities, and limited visibility hinder effective risk management, leaving enterprises vulnerable amid digital transformation and AI-driven threats. Traditional risk assessment methods, like CVSS-based prioritization, fail to account for business impact, often resulting in ineffective risk mitigation strategies. Security teams must involve non-security stakeholders, such as finance and operations, to prioritize risks based on asset value and business impact rather than technical severity. The Risk Operations Center (ROC) model offers a unified approach, integrating cybersecurity with operational and financial risk to enhance risk prioritization and mitigation. By adopting ROC frameworks, organizations can improve resilience and operational efficiency, focusing on risk exposure before breaches occur. Cyber leaders must shift from compliance-driven approaches to context-aware strategies, emphasizing business impact to gain executive buy-in and effectively reduce cyber risks.
Details