Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12625

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-12-12 09:51:36 bleepingcomputer VULNERABILITIES CISA Mandates Urgent Patch for Critical GeoServer Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has instructed U.S. federal agencies to patch a critical GeoServer vulnerability, CVE-2025-58360, now actively exploited in cyberattacks. This vulnerability involves an XML External Entity (XXE) flaw in GeoServer 2.26.1 and earlier, enabling attackers to execute denial-of-service attacks or access sensitive data. Over 14,000 GeoServer instances are exposed online, with 2,451 IP addresses currently tracked by the Shadowserver group for potential exploitation. Federal Civilian Executive Branch agencies must patch affected systems by January 1, 2026, as per Binding Operational Directive 22-01. CISA advises network defenders to prioritize patching this vulnerability, warning of its frequent use in malicious cyber activities. In 2024, an unpatched GeoServer vulnerability was exploited to breach an unnamed U.S. government agency, highlighting the importance of timely updates. Agencies are urged to apply vendor-recommended mitigations, follow BOD 22-01 guidance, or discontinue the product if necessary.
Details
2025-12-12 09:02:06 thehackernews VULNERABILITIES React Server Components Vulnerabilities Pose DoS and Code Exposure Risks
The React team has addressed two new vulnerabilities in React Server Components (RSC) that could lead to denial-of-service (DoS) attacks or source code exposure. These issues emerged as the security community tested patches for CVE-2025-55182, a critical bug with a CVSS score of 10.0, already exploited in the wild. Successful exploitation of CVE-2025-55183 requires a Server Function that exposes an argument in string format, affecting specific versions of react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. Security researchers RyotaK, Shinsaku Nomura, and Andrew MacPherson reported these vulnerabilities through the Meta Bug Bounty program, highlighting the importance of collaborative security efforts. Users are urged to update to versions 19.0.3, 19.1.4, and 19.2.3 promptly, especially given the active exploitation of CVE-2025-55182. The React team emphasized that additional vulnerability disclosures, while frustrating, indicate a robust response cycle and are common across the software industry. This incident underscores the need for continuous vigilance and timely updates to mitigate potential security threats in widely-used software frameworks.
Details
2025-12-12 08:46:35 thehackernews VULNERABILITIES React2Shell Vulnerability Exploitation Prompts Urgent Global Mitigation Efforts
The React2Shell vulnerability, CVE-2025-55182, is being actively exploited globally, affecting React Server Components and other frameworks like Next.js and Vite. CISA has mandated federal agencies to patch the vulnerability by December 12, 2025, due to its critical nature and a CVSS score of 10.0. The flaw allows attackers to execute arbitrary, privileged JavaScript on affected servers without authentication or user interaction, posing significant risks. Cloudflare and Wiz have observed widespread attacks, particularly targeting internet-facing Next.js applications and Kubernetes workloads, with some regions being excluded from scans. Threat actors have focused on networks in Taiwan, Xinjiang Uyghur, Vietnam, Japan, and New Zealand, aligning with geopolitical intelligence priorities. Kaspersky reported over 35,000 exploitation attempts in a single day, with attackers deploying cryptocurrency miners and botnet malware like Mirai variants. An open directory containing a proof-of-concept exploit script has been discovered, facilitating further exploitation attempts by unidentified threat actors. Over 137,200 internet-exposed IP addresses are running vulnerable code, with the majority located in the U.S., highlighting the widespread impact and urgency for remediation.
Details
2025-12-12 08:46:35 bleepingcomputer VULNERABILITIES MITRE Releases 2025's Top 25 Dangerous Software Weaknesses List
MITRE, in collaboration with HSSEDI and CISA, has unveiled the 2025 list of the most dangerous software weaknesses, impacting over 39,000 vulnerabilities disclosed within the past year. Cross-Site Scripting (CWE-79) remains the most critical vulnerability, while Missing Authorization and Null Pointer Dereference have climbed significantly in the rankings. New entries include various buffer overflow types and improper access control, highlighting evolving threats that can lead to system takeovers and data breaches. The list is derived from an analysis of 39,080 CVE Records, with each weakness scored on severity and frequency, guiding organizations in prioritizing security measures. CISA and MITRE urge organizations to incorporate the list into software security strategies and adopt Secure by Design practices to mitigate risks. Recent CISA alerts have emphasized the need to address persistent vulnerabilities, with particular focus on those exploited by state-sponsored actors in ongoing campaigns. The U.S. government has extended MITRE's funding to ensure the continuity of the CVE program, underscoring the importance of addressing software vulnerabilities.
Details
2025-12-12 07:19:19 bleepingcomputer CYBERCRIME ACE Shuts Down Major Indian Piracy Network MKVCinemas
The Alliance for Creativity and Entertainment (ACE) dismantled MKVCinemas, a leading piracy service in India with over 142 million visits in two years. Backed by major studios like Disney and Warner Bros, ACE's actions included criminal referrals and civil litigation to combat illegal streaming. The operator in Bihar, India, ceased operations and transferred control of 25 related domains, redirecting users to ACE's "Watch Legally" portal. A file-cloning tool aiding piracy in India and Indonesia was also shut down, having facilitated 231 million visits by concealing media sources. Recent ACE efforts, in collaboration with law enforcement, have targeted multiple large-scale piracy networks, including Streameast and Rare Breed TV. ACE's ongoing operations emphasize a commitment to disrupting illegal streaming, supporting a secure and sustainable digital content marketplace. Europol's coordinated action in November led to the disruption of 69 piracy sites, initiating 44 new investigations linked to $55 million in cryptocurrency.
Details
2025-12-12 05:07:28 thehackernews VULNERABILITIES CISA Identifies Critical GeoServer XXE Vulnerability in Active Exploitation
CISA has added CVE-2025-58360, a high-severity XXE flaw in OSGeo GeoServer, to its Known Exploited Vulnerabilities catalog due to active exploitation evidence. The vulnerability affects GeoServer versions up to 2.25.5 and 2.26.0 through 2.26.1, with patches available in versions 2.25.6, 2.26.2, 2.27.0, 2.28.0, and 2.28.1. Exploitation can allow attackers to access arbitrary files, conduct SSRF attacks, or launch DoS attacks, impacting server integrity and availability. The flaw was initially reported by the AI-powered platform XBOW, emphasizing the importance of advanced threat detection technologies in identifying vulnerabilities. Federal Civilian Executive Branch agencies must implement the necessary patches by January 1, 2026, to mitigate potential risks and secure their networks. No detailed information is available on the specific methods of exploitation, but the Canadian Centre for Cyber Security confirms an exploit exists in the wild. This incident follows previous exploitation of another critical GeoServer flaw, CVE-2024-36401, highlighting ongoing security challenges with this software.
Details
2025-12-12 02:01:14 theregister CYBERCRIME Terraform Labs Founder Sentenced to 15 Years for Massive Fraud
Do Kwon, founder of Terraform Labs, has been sentenced to 15 years in prison for fraud related to the collapse of the Terra USD (UST) stablecoin. Kwon's scheme involved promoting UST as a stablecoin pegged to the US dollar, which failed disastrously, leading to a $40 billion loss. The collapse affected global investors, with the value of UST plummeting from $1.00 to $0.09, despite attempts to stabilize it with a $3.5 billion bitcoin purchase. Kwon, a South Korean national, was apprehended in Montenegro after fleeing Singapore and attempting to travel with a fake passport. The United States won the extradition battle against South Korea and prosecuted Kwon, who eventually pleaded guilty to multiple fraud charges. Judge Paul Engelmayer emphasized the large-scale impact of Kwon's actions, resulting in a sentence exceeding the prosecutors' 12-year recommendation. The Securities and Exchange Commission has secured $4.5 billion to distribute among creditors, a fraction of the total losses incurred by investors. Victim impact statements reveal significant financial and emotional distress among investors, many of whom face ongoing personal and financial challenges.
Details
2025-12-11 21:50:40 bleepingcomputer VULNERABILITIES Critical Cryptographic Flaw in Gladinet Products Enables RCE Attacks
Hackers are exploiting a cryptographic vulnerability in Gladinet's CentreStack and Triofox products, leading to remote code execution (RCE) attacks against various organizations. The flaw involves hardcoded cryptographic keys within the AES algorithm, allowing attackers to decrypt sensitive data and impersonate users. Researchers identified that the vulnerability is being actively exploited, with at least nine organizations, including those in healthcare and technology, affected. Gladinet has released a new product version as of December 8, urging customers to update and rotate machine keys to mitigate the risk. Indicators of compromise (IoCs) have been shared with customers, including specific strings and IP addresses linked to the attacks. The vulnerability stems from static keys derived from text strings, which attackers use to forge access tickets and trigger RCE through a ViewState deserialization flaw. Organizations are advised to review logs for specific IoCs and apply mitigation strategies as outlined by Huntress to secure their environments.
Details
2025-12-11 21:05:31 bleepingcomputer VULNERABILITIES Notepad++ Releases Critical Update to Fix Malicious Update Flaw
Notepad++ version 8.8.9 addresses a security flaw in its WinGUp update tool, which allowed attackers to push malicious executables instead of legitimate updates. The issue was first reported in a community forum where users noted suspicious behavior, including the execution of unauthorized commands to collect device information. Malicious executables used the curl.exe command to exfiltrate data to a remote site, raising concerns about potential network hijacking or installation of unofficial software versions. Developer Don Ho released version 8.8.8 to restrict updates to GitHub, followed by version 8.8.9, which requires code-signing certificate verification for all updates. Security expert Kevin Beaumont reported incidents involving Notepad++ installations in East Asia, suggesting targeted attacks with threat actors gaining initial access via hijacked updates. The investigation into the traffic hijacking method is ongoing, with users advised to upgrade to version 8.8.9 and remove any older custom root certificates. This incident underscores the importance of securing software update mechanisms to prevent unauthorized access and data exfiltration.
Details
2025-12-11 20:58:20 theregister CYBERCRIME CyberVolk's Ransomware Service Exposes Flaws in Encryption Security
CyberVolk, a pro-Russian hacktivist group, has launched a new ransomware-as-a-service, VolkLocker, utilizing Telegram for operations, simplifying ransomware deployment for affiliates. The ransomware targets both Linux and Windows systems, employing AES-256 encryption but inadvertently stores master keys in plaintext, allowing potential data recovery. Despite its technical automation via Telegram, CyberVolk's operation suffers from quality control issues, evidenced by the inclusion of test artifacts in production builds. The group advertises additional tools like remote access trojans and keyloggers, expanding their cybercrime toolkit beyond ransomware. CyberVolk's use of Telegram reflects a growing trend among threat actors to leverage mainstream platforms for command and control, lowering the entry barrier for cybercriminals. The group's resurgence indicates ongoing challenges in curbing hacktivist activities, despite previous bans from platforms like Telegram. Security experts recommend vigilance in network defenses, as CyberVolk's tactics illustrate evolving methods in politically motivated cybercrime.
Details
2025-12-11 20:58:20 bleepingcomputer MALWARE Malicious VSCode Extensions Conceal Trojan in Fake PNG Files
A campaign involving 19 malicious extensions on the VSCode Marketplace has targeted developers since February, embedding malware in dependency folders. The extensions included a modified 'node_modules' folder to bypass npm registry checks, with a weaponized 'path-is-absolute' dependency executing upon IDE startup. A file disguised as a .PNG image contained two malicious binaries: 'cmstp.exe' and a Rust-based trojan, the latter still under analysis by ReversingLabs. ReversingLabs reported the malicious extensions to Microsoft, resulting in their removal from the marketplace, yet systems with these extensions require scanning for compromise. The campaign exploited VSCode's popularity, emphasizing the need for developers to scrutinize package dependencies, especially from less reputable sources. This incident highlights the ongoing risk of supply-chain attacks in software development environments, urging enhanced vigilance and security practices.
Details
2025-12-11 17:13:21 theregister VULNERABILITIES Google Issues Emergency Patch for Eighth Chrome Zero-Day of 2025
Google released an urgent update for Chrome to address its eighth zero-day vulnerability of 2025, currently under active exploitation. The specific details of the vulnerability, including its CVE identifier, remain undisclosed as Google coordinates further information. Users on Mac, Windows, and Linux should update to the latest Chrome versions 143.0.7499.109/.110 to mitigate the risk. The update also resolves a medium-severity use-after-free flaw in Password Manager, identified as CVE-2025-14372, and an inappropriate implementation issue in Toolbar, CVE-2025-14373. This zero-day fix follows closely on the heels of a recent patch for a type confusion flaw in the V8 JavaScript engine, CVE-2025-13223. Google's strategy involves withholding full vulnerability details until a majority of users have applied the necessary updates, minimizing potential exploitation. The rapid succession of zero-day vulnerabilities in Chrome underscores the critical need for timely updates and robust browser security practices.
Details
2025-12-11 17:13:21 bleepingcomputer DATA BREACH LastPass Fined £1.2 Million for 2022 Data Breach Impacting Millions
The UK Information Commissioner's Office fined LastPass £1.2 million for a 2022 breach affecting 1.6 million UK users, citing inadequate security measures. The breach involved two incidents starting in August 2022, with attackers accessing the development environment and stealing encrypted password vaults. Attackers compromised a senior employee's device using a known vulnerability in a third-party application, leading to malware deployment and credential theft. The breach allowed attackers to access LastPass database backups, including encrypted vaults, personal information, and metadata stored on GoTo's cloud platform. LastPass maintains that its Zero Knowledge architecture prevented the decryption of customer vaults, though weak passwords remain vulnerable to brute-force attacks. The ICO urges companies to strengthen access controls and internal systems, and advises users to adopt strong, complex passwords for enhanced security. The incident underscores the importance of robust password management and highlights potential risks associated with remote work and third-party applications.
Details
2025-12-11 16:51:45 theregister DATA BREACH LastPass Fined £1.2M for Major 2022 Data Breach Incidents
The UK's Information Commissioner's Office fined LastPass £1.2 million after a 2022 breach exposed data of up to 1.6 million UK users. The breach involved two separate incidents, compromising both corporate and personal devices, leading to unauthorized access to sensitive data. Attackers initially accessed a developer's MacBook, exfiltrating 14 source code repositories and exploiting a Plex vulnerability to compromise a senior engineer's PC. The breach exposed names, emails, phone numbers, and URLs, though no evidence suggests passwords were decrypted. LastPass's policy of linking personal and business accounts with the same master password facilitated unauthorized access. The breach went undetected for weeks due to communication failures during LastPass's transition from its former parent company, GoTo. The ICO emphasized the need for robust security measures and separate credentials for personal and business accounts to safeguard sensitive data. LastPass is considering its response to the fine, which reflects the company's failure to protect customer data adequately.
Details
2025-12-11 15:14:29 bleepingcomputer MALWARE AI-Powered Cyberattacks Demand Advanced Network Detection and Response Solutions
Cybersecurity experts report a rise in AI-driven attacks, utilizing machine learning to automate reconnaissance, exploit vulnerabilities, and harvest data at unprecedented scale and speed. Google's Threat Intelligence and Anthropic have tracked AI tools capable of bypassing security measures, generating malicious scripts, and orchestrating complex malware operations. Traditional security systems struggle against these threats, prompting organizations to adopt Network Detection and Response (NDR) solutions for enhanced defense. NDR systems offer real-time network monitoring, anomaly detection, and automated threat identification, crucial for countering fast-moving AI-based attacks. Corelight's NDR platform provides deep visibility and advanced behavioral analytics, enabling Security Operations Centers (SOCs) to identify and mitigate AI-fueled threats effectively. The shift towards NDR solutions reflects the need for agility and comprehensive network visibility as attackers increasingly leverage AI to evade legacy defenses. By reducing false positives and offering actionable insights, NDR systems empower incident responders to swiftly address threats, minimizing potential damage and data loss.
Details