Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 11713
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-10-14 05:34:00 | thehackernews | MALWARE | TA585's MonsterV2 Malware Campaigns Exploit Sophisticated Attack Chains | Researchers from Proofpoint have identified a new threat actor, TA585, deploying MonsterV2 malware through advanced phishing campaigns, exploiting IRS-themed lures and GitHub notifications.
MonsterV2, a remote access trojan, stealer, and loader, is being sold on criminal forums, with prices ranging from $800 to $2,000 per month, depending on the version.
TA585 manages its entire attack chain, utilizing web injections, filtering checks, and ClickFix social engineering tactics to deliver malware without relying on third-party services.
The malware avoids infecting Commonwealth of Independent States (CIS) countries and uses SonicCrypt to evade detection, executing anti-analysis checks before payload decryption.
TA585's campaigns have evolved to include malicious JavaScript injections on legitimate websites, employing fake CAPTCHA overlays to initiate malware delivery via PowerShell commands.
The infrastructure linked to TA585 also distributes other malware like Rhadamanthys Stealer, indicating a broader cybercriminal ecosystem.
Organizations are urged to strengthen their email security protocols and educate employees on phishing tactics to mitigate the risks posed by such sophisticated campaigns. | Details |
| 2025-10-13 21:55:57 | bleepingcomputer | VULNERABILITIES | Microsoft Limits IE Mode in Edge Following Zero-Day Exploits | Microsoft has restricted Internet Explorer mode in Edge after discovering zero-day exploits in the Chakra JavaScript engine targeting devices through social engineering tactics.
Hackers used an unpatched vulnerability in Chakra, coupled with a privilege escalation flaw, to gain remote code execution and full device control.
The threat actors lured users to spoofed websites, prompting them to load pages in IE mode, exploiting the zero-day vulnerability.
To mitigate risks, Microsoft removed easy access methods for activating IE mode, requiring users to navigate through settings for intentional use.
These changes aim to reduce accidental activation of IE mode, making it harder for attackers to exploit the vulnerability.
Commercial users remain unaffected by these restrictions, but Microsoft advises transitioning from legacy web technologies to more secure modern alternatives.
The security update reflects Microsoft's ongoing efforts to protect users by addressing vulnerabilities and enhancing browser security features. | Details |
| 2025-10-13 20:12:50 | bleepingcomputer | DATA BREACH | SimonMed Data Breach Affects Over 1.2 Million Patients' Information | SimonMed Imaging experienced a data breach impacting over 1.2 million patients, exposing sensitive information including potential medical and financial data.
The breach occurred from January 21 to February 5, with unauthorized access confirmed after a vendor reported a security incident on January 27.
SimonMed responded by implementing security measures such as password resets, multifactor authentication, and enhanced endpoint detection and response monitoring.
The Medusa ransomware group claimed responsibility, demanding a $1 million ransom and leaking some data to prove the breach.
Despite the breach, SimonMed reports no evidence of fraud or identity theft as of October 10, offering affected individuals free identity theft protection services.
The incident underscores the ongoing threat of ransomware attacks, particularly from groups like Medusa, which have previously targeted critical infrastructure.
SimonMed's response included notifying law enforcement and engaging data security professionals to mitigate further risks. | Details |
| 2025-10-13 18:10:46 | bleepingcomputer | CYBERCRIME | Multi-Country Botnet Targets U.S. RDP Services in Widespread Attack | A large-scale botnet is actively targeting Remote Desktop Protocol (RDP) services in the U.S., originating from over 100,000 IP addresses across multiple countries.
The campaign began on October 8, with GreyNoise researchers identifying unusual traffic patterns initially from Brazil, then spreading to other regions.
Countries involved in the attack include Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador, with a total of over 100 countries having compromised devices.
Attackers employ two types of RDP-related attacks, often scanning for open ports, brute-forcing logins, exploiting vulnerabilities, or using timing attacks.
Nearly all IP addresses involved share a common TCP fingerprint, suggesting coordinated botnet activity despite variations in Maximum Segment Size.
System administrators are advised to block attacking IP addresses, monitor logs for suspicious RDP activity, and avoid exposing RDP to the public internet.
Implementing VPNs and multi-factor authentication (MFA) is recommended to enhance security against these types of attacks. | Details |
| 2025-10-13 16:26:18 | theregister | CYBERCRIME | Scattered Lapsus$ Hunters Go Dark Following FBI Crackdown | The Scattered Lapsus$ Hunters (SLSH) announced a temporary retreat until 2026 after the FBI seized their clearweb site, marking their second disappearance in a month.
The group, primarily composed of young Westerners, issued a provocative message on Telegram, threatening future retaliation against the FBI upon their return.
Recent law enforcement actions include arrests of suspected members linked to attacks on high-profile UK organizations, intensifying scrutiny on the group.
SLSH leaked data from major companies like Qantas and Vietnam Airlines, impacting millions of customers, though some claims have been debunked by affected firms.
Security experts warn that leaked data could be exploited for social engineering attacks, urging affected organizations to enhance their cybersecurity measures.
The group's tactics, including extortion attempts and data leaks, are seen as intimidation tactics to coerce ransom payments, though these efforts have largely failed.
SLSH's activities underline the importance of robust cybersecurity practices, such as password reset verification and improved service desk processes, to mitigate such threats. | Details |
| 2025-10-13 16:03:59 | bleepingcomputer | DATA BREACH | SonicWall VPN Accounts Compromised in Large-Scale Credential Attack | Threat actors have breached over 100 SonicWall SSLVPN accounts using stolen, valid credentials, impacting 16 environments managed by Huntress.
The attacks began on October 4, with rapid authentication into multiple accounts, suggesting control over valid credentials rather than brute force methods.
Post-authentication activities included network scans and attempts to access local Windows accounts, indicating a structured approach to reconnaissance and lateral movement.
The IP address 202.155.8[.]73 was identified as the source of most malicious requests, highlighting a potential focal point for further investigation.
No direct link was found between these breaches and the recent SonicWall incident involving exposed firewall configuration files, which remain encrypted.
Huntress recommends restricting WAN management, limiting remote access, and implementing multi-factor authentication for admin and remote accounts to mitigate risks.
SonicWall has yet to provide an official statement, but system administrators are advised to follow a security checklist and rotate all secrets before reintroducing services. | Details |
| 2025-10-13 14:44:57 | bleepingcomputer | VULNERABILITIES | Oracle Issues Emergency Patch for Critical E-Business Suite Flaw | Oracle released an urgent security update for E-Business Suite versions 12.2.3 to 12.2.14, addressing CVE-2025-61884, a critical information disclosure flaw.
This vulnerability allows unauthenticated attackers to exploit systems remotely, potentially leading to unauthorized access to sensitive data without needing login credentials.
The flaw has a CVSS Base Score of 7.5, indicating a high severity level, necessitating immediate action by affected organizations to mitigate risks.
Oracle's patch follows previous vulnerabilities exploited by the Clop extortion group, which targeted EBS vulnerabilities in recent campaigns.
CrowdStrike identified Clop's use of CVE-2025-61882 in zero-day attacks, raising concerns about potential exploitation of the new flaw by similar threat actors.
Security experts recommend applying the out-of-band patch urgently, as internet-facing Oracle EBS instances remain prime targets for cybercriminals.
The incident underscores the importance of timely patch management and proactive threat monitoring to safeguard critical business applications. | Details |
| 2025-10-13 14:12:14 | bleepingcomputer | MALWARE | Varonis Launches AI-Powered Email Security to Combat Advanced Phishing | Varonis has introduced Interceptor, an AI-native email security solution designed to tackle sophisticated phishing and social engineering threats that evade traditional security measures.
Interceptor employs a multimodal AI strategy, integrating visual, linguistic, and behavioral analysis to detect and block AI-generated threats with high accuracy.
The solution outperforms existing security tools by addressing limitations in natural language processing and incorporating comprehensive threat detection capabilities.
Interceptor's phishing sandbox proactively scans new domains and URLs, blocking malicious content 12-24 hours before other market solutions.
The platform extends protection beyond email, offering browser security to shield users from phishing sites across various digital channels.
By integrating with the Varonis Data Security Platform, Interceptor enhances end-to-end security, enabling early detection and mitigation of data breach attempts.
Organizations benefit from reduced false positives and negatives, improving operational efficiency and enhancing user trust in email communications. | Details |
| 2025-10-13 13:45:06 | theregister | DATA BREACH | Austrian Ruling Finds Microsoft Illegally Tracked Students via 365 Education | Austria's Data Protection Authority ruled Microsoft illegally tracked students using its 365 Education platform, violating GDPR by failing to provide complete data access information.
The ruling arose from a complaint during the pandemic, when schools rapidly adopted online learning solutions, spotlighting Microsoft's data handling practices.
Microsoft attempted to shift GDPR compliance responsibility to schools and local authorities, which lacked control over student data processing.
The authority mandated Microsoft to clarify data usage, including terms like "internal reporting" and "business modelling," and disclose any third-party data transfers.
The decision challenges Microsoft's claim that its Irish subsidiary should handle GDPR jurisdiction, asserting instead that Microsoft US is responsible.
Microsoft has stated its commitment to GDPR compliance and plans to review the ruling to determine further actions.
This case underscores the ongoing tension between tech giants and European data privacy regulations, with potential implications for Microsoft's operations across Europe. | Details |
| 2025-10-13 13:26:30 | thehackernews | VULNERABILITIES | Oracle E-Business Suite Zero-Day Exploitation Affects Multiple Organizations | A zero-day vulnerability in Oracle's E-Business Suite (CVE-2025-61882) has been actively exploited since August 9, 2025, impacting numerous organizations globally.
The exploitation involves multiple vulnerabilities, with attack chains deploying malware such as GOLDVEIN.JAVA, SAGEGIFT, SAGELEAF, and SAGEWAVE, suggesting sophisticated threat actor involvement.
Google Threat Intelligence Group and Mandiant linked the activity to tactics associated with the Cl0p ransomware group, indicating potential data exfiltration risks.
Oracle has issued updates to address another critical vulnerability (CVE-2025-61884) in the same product, though its active exploitation status remains unconfirmed.
The rapid exploitation of these vulnerabilities underscores the critical need for timely patch management and proactive security measures.
Organizations are advised to prioritize patching Oracle EBS vulnerabilities and review security protocols to prevent unauthorized access and data breaches.
This incident illustrates the evolving threat landscape, where attackers increasingly leverage complex vulnerabilities to infiltrate and compromise systems. | Details |
| 2025-10-13 12:28:44 | theregister | NATION STATE ACTIVITY | China Investigates Qualcomm's Autotalks Deal Amid US Trade Tensions | China's State Administration for Market Regulation (SAMR) has initiated an inquiry into Qualcomm's acquisition of Israeli firm Autotalks, citing potential anti-competitive effects.
The investigation is part of a broader context of escalating tech trade tensions between the US and China, with recent moves affecting rare earth metal exports.
Qualcomm's acquisition of Autotalks, focused on vehicle-to-everything communications, was previously abandoned due to regulatory concerns but resumed this summer.
SAMR's probe questions whether Qualcomm failed to notify the regulator of crucial details, potentially leading to more stringent regulatory actions.
The investigation coincides with US threats of increased tariffs on Chinese imports, further straining international trade relations.
China's strategic use of rare earths in trade negotiations underscores its leverage in the ongoing tech rivalry with the US.
Previous actions by SAMR include scrutiny of Nvidia's compliance with competition rules, reflecting China's assertive regulatory stance on foreign tech acquisitions. | Details |
| 2025-10-13 11:52:25 | thehackernews | VULNERABILITIES | Unmonitored JavaScript Poses Significant Holiday Security Threats | The upcoming 2025 holiday season faces risks from unmonitored JavaScript, which can bypass traditional security measures like WAFs and intrusion detection systems.
The 2024 attacks on Polyfill.io and Cisco Magecart exploited third-party code vulnerabilities, affecting over 500,000 websites and targeting holiday shoppers.
Client-side vulnerabilities, such as e-skimming and shadow scripts, operate within users' browsers, making detection difficult without specialized monitoring tools.
Increased transaction volumes and code freeze periods during holidays elevate the risk, with 5% of Cyber Monday 2024 requests flagged as potential attacks.
Effective client-side security requires deploying Content Security Policies, Subresource Integrity tags, and real-time monitoring tools to detect malicious JavaScript activity.
Organizations need to develop specific incident response procedures for client-side threats, ensuring rapid action during high-traffic periods.
Transitioning to comprehensive client-side security strategies is critical for protecting customer data and establishing a resilient security posture beyond the holiday season. | Details |
| 2025-10-13 11:19:59 | theregister | DATA BREACH | Ofcom Fines 4chan for Non-Compliance with Online Safety Act | Ofcom fined 4chan £20,000 for failing to protect children from harmful content, marking the first penalty under the UK's Online Safety Act.
Additional fines of up to £6,000 may accrue if 4chan does not submit required risk assessments and revenue information to Ofcom.
The Online Safety Act mandates platforms to remove illegal content and protect users, with penalties reaching £18 million or 10% of global revenue.
Ofcom has initiated 21 investigations since March 2025, targeting platforms failing to comply with content safety regulations.
Some platforms, like Krakenfiles and Nippydrive, avoided penalties by geo-blocking UK users, reducing exposure to harmful content.
Ofcom's enforcement includes promoting hash-matching technology to prevent the spread of illegal content, with some platforms already adopting these measures.
The UK government maintains a stance against banning VPNs, despite their use in bypassing geo-blocks, focusing on platforms that promote such workarounds. | Details |
| 2025-10-13 11:19:59 | bleepingcomputer | DATA BREACH | Harvard Data Breach Tied to Oracle Zero-Day Exploit by Clop Gang | Harvard University is investigating a data breach linked to a zero-day vulnerability in Oracle's E-Business Suite, exploited by the Clop ransomware group.
The breach affects a limited number of parties within a small administrative unit, according to Harvard's IT department.
Oracle's zero-day flaw, tracked as CVE-2025-61882, has been patched following its exploitation in these attacks.
Clop has threatened to release Harvard's data publicly unless a ransom is paid, continuing its pattern of extortion tactics.
Mandiant and Google have identified a broader extortion campaign targeting Oracle E-Business Suite customers.
The incident highlights the ongoing risk of zero-day vulnerabilities and the importance of timely patch management.
Organizations using Oracle's software are advised to apply the latest security updates and monitor for suspicious activity. | Details |
| 2025-10-13 11:04:42 | theregister | NATION STATE ACTIVITY | Dutch Government Restricts Nexperia Over Security Concerns with China | The Dutch government imposed special administrative measures on Nexperia, a Chinese-owned semiconductor firm, citing governance failures that threaten European technological security.
The Ministry of Economic Affairs invoked the Goods Availability Act to prevent potential transfer of sensitive chip technology to Nexperia's Chinese parent company, Wingtech Technology.
Under these measures, Nexperia’s corporate decisions can be blocked or reversed if they harm Dutch operations or critical supply chains.
Wingtech criticized the Dutch intervention as politically motivated and claimed it freezes Nexperia's global operations for a year.
This action is part of broader Western efforts to limit Chinese access to strategic semiconductor assets amid rising technological competition.
Nexperia previously faced scrutiny in the UK, resulting in the forced sale of Newport Wafer Fab following a national security review.
The situation reflects ongoing geopolitical tensions affecting the global semiconductor industry, with significant implications for supply chain security. | Details |