Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12628

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-12-08 06:51:50 thehackernews NATION STATE ACTIVITY MuddyWater Launches UDPGangster Backdoor in Targeted Cyber Espionage Campaign
Iranian hacking group MuddyWater is deploying a new backdoor, UDPGangster, targeting users in Turkey, Israel, and Azerbaijan, according to Fortinet FortiGuard Labs. UDPGangster uses the User Datagram Protocol (UDP) for command-and-control, enabling remote control, file exfiltration, and additional payload deployment. Attackers employ spear-phishing tactics, distributing malicious Microsoft Word documents that activate payloads when macros are enabled. Phishing messages often impersonate the Turkish Republic of Northern Cyprus Ministry of Foreign Affairs, inviting recipients to fake online seminars. The malicious payload establishes persistence via Windows Registry changes and uses anti-analysis checks to evade security research efforts. UDPGangster communicates with an external server over UDP port 1269 to exfiltrate data and execute commands, posing a significant threat to targeted sectors. Organizations are advised to be vigilant against unsolicited documents, especially those requesting macro activation, to mitigate potential risks.
Details
2025-12-08 05:07:03 theregister VULNERABILITIES Gartner Advises Blocking AI Browsers Due to Security Concerns
Gartner advises organizations to block AI browsers like Perplexity’s Comet and OpenAI’s ChatGPT Atlas, citing security risks from default settings prioritizing user experience over security. AI browsers can expose sensitive user data, such as browsing history and open tabs, to cloud-based AI back-ends, increasing the risk of data exposure. The advisory suggests assessing AI browser back-end security measures to determine acceptable risk levels before approval for organizational use. Potential risks include rogue agent actions, erroneous decisions, and credential abuse if AI browsers are manipulated into visiting phishing sites. Users might misuse AI browsers for automating mandatory tasks, risking errors in processes like procurement, leading to unintended purchases. Mitigation strategies include restricting AI browser data retention and disabling email functionalities to limit potential misuse. Gartner emphasizes the need for comprehensive risk assessments and monitoring to manage AI browser use, likely resulting in numerous prohibited use cases.
Details
2025-12-08 02:03:17 theregister DATA BREACH South Korea Tightens Cybersecurity Standards After Coupang Data Breach
South Korea plans to enhance security certifications following a data breach at Coupang, affecting data of over half the nation’s population. Coupang reported no evidence of stolen data reuse, yet the incident prompted government action to prevent future breaches. New standards will be mandatory for major online entities, with post-incident audits required to identify security failures. The breach underscores the critical need for robust cybersecurity measures in protecting sensitive consumer data. This initiative reflects a growing trend of governments imposing stricter cybersecurity regulations on digital platforms. Companies operating in South Korea may face increased compliance costs and operational changes to meet new security requirements.
Details
2025-12-08 00:18:24 theregister VULNERABILITIES Apache Tika Users Warned of Critical Metadata Parsing Vulnerability
Apache Foundation has issued a warning about a critical vulnerability, CVE-2025-66516, in its Tika toolkit, which scores a 10.0 severity rating. Tika, used for metadata extraction from over 1,000 file formats, has a flaw that could allow attackers to exploit XML External Entity injection. The vulnerability is linked to the tika-core component, requiring users to upgrade to version 3.2.2 or later to mitigate the risk. Previous fixes for related vulnerabilities may not protect users who only updated the tika-parser-pdf-module without addressing tika-core. Apache's advisory clarifies that earlier Tika releases had the PDFParser in a different module, complicating the patching process for users. Organizations relying on Tika should review their systems to ensure all components are updated to prevent potential exploitation. OVH, a French cloud service provider, is enhancing its DDOS protection by adding 2-3Tbps of capacity weekly in response to new attack patterns. Recent DDOS attacks, originating from the US and South America, have reached sizes of 15-16Tbps, targeting infrastructure via major US cities. The company plans to deploy 100Tbps of DDOS-deflectors to safeguard its operations against these escalating threats. This proactive expansion aims to maintain service reliability and protect client data from disruptions caused by these large-scale attacks. The rise in attack volume underscores the need for robust DDOS mitigation strategies in the face of evolving cyber threats. Representative August Pfluger introduced the Cyber Deterrence and Response Act to empower the National Cyber Director with authority for cyber threat attribution. The bill seeks to establish a government-wide process for identifying and sanctioning cyber adversaries, aligning agencies under unified evidentiary standards. Provisions include collaboration with private companies and international allies to enhance threat intelligence sharing and response capabilities. The legislation aims to strengthen national security by holding foreign hackers accountable and protecting critical infrastructure from cyberattacks. This initiative reflects ongoing efforts to develop a comprehensive cybersecurity strategy amid rising geopolitical tensions and cyber threats. The National Institute of Standards and Technology (NIST) has published three new documents to guide the secure onboarding of Internet of Things (IoT) devices. These guidelines focus on secure provisioning, network layer onboarding, and lifecycle management to prevent IoT devices from becoming attack vectors. IoT devices often lack built-in security, posing significant risks to networks; NIST's publications aim to address these vulnerabilities. Organizations managing IoT technology are encouraged to adopt these practices to enhance device security and reduce potential cyber threats. The initiative highlights the critical need for standardized security measures in the rapidly growing IoT landscape. The Department of Justice has dismantled Tickmilleas.com, a fraudulent cryptocurrency trading site mimicking the legitimate Tickmill platform. The scam site targeted users with promises of high returns, tricking them into depositing funds, which were then stolen by the fraudsters. Believed to be linked to Chinese and Burma-based criminal gangs, the site also distributed fake apps on Google Play and Apple’s App Store. This action is part of the DOJ's broader crackdown on "pig-butchering" scams, which are proliferating in Asia and other regions. The swift response by the Scam Center Task Force underscores the ongoing threat of cryptocurrency fraud and the need for vigilant monitoring.
Details
2025-12-07 15:14:30 bleepingcomputer VULNERABILITIES Portugal's New Cybercrime Law Shields Ethical Hackers from Prosecution
Portugal's revised cybercrime law now offers legal protection for security researchers conducting good-faith vulnerability assessments, under specific conditions outlined in Article 8.o-A. This legal exemption permits actions previously deemed illegal, such as unauthorized system access, when performed to enhance cybersecurity. Security researchers must adhere to defined limits to qualify for immunity, ensuring their activities serve the public interest in cybersecurity. The initiative aligns with global trends, as Germany and the U.S. have introduced similar protections, fostering a supportive environment for ethical hacking. These legal frameworks encourage proactive identification and reporting of security flaws, reducing the risk of criminal liability for researchers. By legally recognizing ethical hacking, Portugal aims to strengthen its cybersecurity posture and promote responsible vulnerability disclosure. The move reflects an increasing global acknowledgment of the critical role ethical hackers play in safeguarding digital infrastructure.
Details
2025-12-06 19:12:49 bleepingcomputer VULNERABILITIES React2Shell Flaw Exploited, Over 30 Organizations Compromised
React2Shell, a critical remote code execution vulnerability (CVE-2025-55182), has been exploited to compromise over 30 organizations, affecting frameworks like Next.js that utilize React Server Components. The flaw allows attackers to execute arbitrary commands via a single HTTP request, with over 77,000 IP addresses identified as vulnerable, primarily in the United States. Security researcher Maple3142 released a proof-of-concept for the exploit, leading to increased scanning and automated attacks from various countries, including China and the Netherlands. Compromised organizations have faced reconnaissance and data theft attempts, with attackers deploying Cobalt Strike beacons and bypassing endpoint security using PowerShell scripts. State-associated Chinese threat actors, such as Earth Lamia and Jackpot Panda, have been linked to these intrusions, leveraging the vulnerability for initial access and further exploitation. In response, companies have rushed to patch systems, with Cloudflare implementing emergency mitigations, though initial updates caused temporary outages. CISA has mandated federal agencies to patch the vulnerability by December 26, 2025, emphasizing the need for immediate action to prevent further exploitation.
Details
2025-12-06 15:29:45 thehackernews VULNERABILITIES Over 30 Security Flaws Found in AI-Powered Coding Tools
Researchers have identified over 30 vulnerabilities in AI-driven Integrated Development Environments (IDEs), potentially leading to data theft and remote code execution (RCE) attacks. The vulnerabilities, named IDEsaster, impact popular IDEs and extensions such as GitHub Copilot, Cursor, and Zed.dev, with 24 issues assigned CVE identifiers. The flaws exploit prompt injection primitives combined with legitimate IDE features, enabling data exfiltration and RCE through AI agents. Attack vectors include context hijacking and tool poisoning, which can be triggered by user-added references or malicious inputs parsed by AI models. Recommendations include applying least privilege principles, minimizing injection vectors, and employing sandboxing to mitigate risks associated with AI agents. The findings highlight the expanded attack surface introduced by AI tools in development environments, posing risks like prompt injection and supply chain compromise. The research underscores the need for a "Secure for AI" approach to address security challenges posed by AI components in software development.
Details
2025-12-06 15:24:18 bleepingcomputer VULNERABILITIES Surge in VPN Login Attempts Targets Palo Alto and SonicWall Systems
A significant campaign is targeting Palo Alto GlobalProtect portals and SonicWall SonicOS API endpoints, originating from 7,000 IP addresses linked to German IT firm 3xK GmbH. The activity involves brute force login attempts on GlobalProtect portals, followed by scanning of SonicWall API endpoints, indicating a methodical approach to uncover vulnerabilities. GreyNoise identified three client fingerprints linked to previous scanning attempts, suggesting a coordinated effort by the same actor. The campaign generated over 9 million HTTP sessions, with 62% of attacking IPs located in Germany, emphasizing the scale of the operation. Palo Alto Networks confirmed these are credential-based attacks, not software vulnerabilities, advising the use of Multi-Factor Authentication to mitigate risks. Organizations are urged to monitor authentication surfaces for unusual activity and implement dynamic, context-aware blocking strategies. This activity underscores the need for vigilance in defending against credential abuse and highlights the importance of robust identity and access management practices.
Details
2025-12-06 11:47:41 thehackernews VULNERABILITIES CISA Adds Critical React2Shell Flaw to Exploited Vulnerabilities List
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-55182, a critical React Server Components flaw, to its Known Exploited Vulnerabilities catalog due to active exploitation reports. This vulnerability, with a CVSS score of 10.0, allows unauthenticated remote code execution via insecure deserialization in the React library's Flight protocol, affecting server-client communications. Attackers can exploit this flaw by sending crafted HTTP requests, enabling arbitrary command execution on affected servers, with some attacks deploying cryptocurrency miners and other payloads. React version updates 19.0.1, 19.1.2, and 19.2.1 address the vulnerability, impacting frameworks like Next.js, React Router, and others; users are urged to update immediately. Exploitation attempts have been linked to Chinese hacking groups, including Earth Lamia and Jackpot Panda, with over 30 organizations affected across various sectors. Security firms such as Palo Alto Networks and Bitdefender have observed reconnaissance and exploitation activities, including the deployment of SNOWLIGHT and VShell tools. Researchers released proof-of-concept exploits, emphasizing the need for rapid patching, while Federal agencies must comply with updates by December 26, 2025, under BOD 22-01. The vulnerability affects approximately 2.15 million internet-facing services, highlighting the extensive exposure and urgency for remediation efforts.
Details
2025-12-06 09:17:03 theregister VULNERABILITIES Rise of Passkeys: A Safer Alternative to Traditional MFA
The cybersecurity community is shifting from passwords to passkeys, offering a more secure, phishing-resistant multifactor authentication (MFA) method. Traditional MFA methods, such as one-time passwords (OTPs) sent via SMS or email, are vulnerable to phishing attacks, leading to unauthorized access. Passkeys utilize cryptographic key pairs, with the private key stored on the user's device, reducing the risk of interception and unauthorized access. Major companies like Amazon, Google, and Microsoft have adopted passkeys, reporting improved sign-in success rates and reduced login times. Organizations using passkeys experience fewer help-desk incidents, lowering operational costs associated with OTPs and support interactions. Despite security benefits, passkey adoption faces challenges in usability, particularly when transitioning between different operating systems. The balance between security and user experience remains crucial, especially for customer-facing platforms where ease of use is a priority.
Details
2025-12-05 23:28:11 theregister CYBERCRIME FBI Warns of AI-Enhanced Virtual Kidnapping and Extortion Scams
The FBI has issued a warning about criminals using altered social media images in virtual kidnapping scams, demanding ransoms from victims' families. Scammers claim to have kidnapped loved ones and send doctored images or videos as fake proof of life, leveraging AI tools to enhance credibility. The FBI received 357 complaints of such scams last year, resulting in $2.7 million in losses, with tactics evolving to include AI-generated content. Criminals often use social media to gather images and personal information, making it easier to target victims and their families. The FBI advises against sharing personal details with strangers and recommends setting a code word known only to family members to verify authenticity. Victims are encouraged to report incidents to the FBI's Internet Crime Complaint Center, providing detailed information to aid investigations. Similar scams targeting corporations involve fake IT workers using AI to alter their appearance during video interviews, with links to North Korean operations.
Details
2025-12-05 21:59:31 theregister VULNERABILITIES New SVG and CSS Clickjacking Technique Exploits Web Security Gaps
Security researcher Lyra Rebane introduced a novel clickjacking method using SVG and CSS, bypassing traditional JavaScript-based defenses, demonstrated at BSides Tallinn. The attack exploits SVG filters to leak information across origins, violating the web's same-origin policy, potentially impacting applications like Google Docs. Rebane's technique involves creating logic gates with SVG filters, allowing complex attack chains without relying on JavaScript, posing a challenge for current web security measures. Google awarded a bug bounty for reporting the vulnerability, acknowledging its significance, though the issue remains unresolved across multiple browsers. Rebane suggests using the Intersection Observer v2 API as a potential defense, detecting when SVG filters obscure iframes, aiding in mitigating this vulnerability. The discovery underscores the evolving nature of clickjacking threats, emphasizing the need for continuous updates to web security protocols and practices. Developers are advised to review and enhance security headers like X-Frame-Options and Content Security Policy to better protect against such emerging threats.
Details
2025-12-05 21:53:52 theregister VULNERABILITIES Cloudflare Outage Linked to React2Shell Vulnerability Mitigation Efforts
Cloudflare experienced a significant outage affecting 28% of its HTTP traffic due to a flawed fix for the React2Shell vulnerability, CVE-2025-55182, not linked to a cyber attack. The React2Shell vulnerability, rated 10.0 on the CVSS scale, allows remote code execution without authentication, impacting React frameworks and bundlers like Next.js. Attackers, including state-sponsored groups from China, have actively exploited the flaw, with reports of reconnaissance and theft of AWS credentials. The U.S. CISA and the British government have issued warnings, and the vulnerability has been added to CISA's Known Exploited Vulnerabilities Catalog. Security researchers have observed both functional and fake proof-of-concepts (POCs) circulating online, complicating mitigation efforts and potentially misleading organizations. The incident underscores the need for faster and more accurate information sharing within the security community to prevent rapid exploitation by threat actors. Security firms predict that ransomware groups and Initial Access Brokers may soon leverage the vulnerability to infiltrate corporate networks. The situation calls for a reassessment of disclosure strategies to better equip defenders against swift exploitation by sophisticated adversaries.
Details
2025-12-05 18:59:52 bleepingcomputer DATA BREACH Barts Health NHS Trust Data Breach Linked to Oracle Zero-Day Exploit
Barts Health NHS Trust has confirmed a data breach after Clop ransomware actors exploited a vulnerability in Oracle E-business Suite software. The breach involved the theft of invoices containing personal details of patients and former employees, exposing sensitive financial information. The compromised data also includes accounting records related to services provided to Barking, Havering, and Redbridge University Hospitals NHS Trust. Clop ransomware has published the stolen data on the dark web, although it has not surfaced on the general internet, limiting immediate exposure. Barts Health NHS Trust is seeking a High Court order to prevent further distribution of the exposed data, though enforcement remains challenging. The incident did not affect electronic patient records or core IT systems, maintaining the integrity of critical healthcare operations. The breach is part of a broader campaign exploiting CVE-2025-61882, impacting multiple organizations globally, including prominent universities and corporations. Authorities, including the National Cyber Security Centre and the Metropolitan Police, have been notified, and affected individuals are advised to remain vigilant.
Details
2025-12-05 17:59:20 thehackernews VULNERABILITIES Zero-Click Attack Threatens Google Drive Data via AI Browser Agents
Straiker STAR Labs identified a zero-click attack exploiting Perplexity's Comet browser, enabling unauthorized deletion of Google Drive contents through crafted emails. The attack leverages AI browser agents connected to Gmail and Google Drive, executing tasks like file deletion without user confirmation. Attackers use polite, sequential natural language instructions to manipulate browser agents, bypassing typical security checks. This vulnerability does not require jailbreaks or prompt injections, relying instead on the AI's interpretation of routine housekeeping tasks. Organizations are advised to secure AI models, agents, and natural language instructions to mitigate zero-click data-wiper risks. Concurrently, Cato Networks revealed the HashJack technique, using URL fragments to indirectly prompt AI browsers, leading to potential exploitation. While Google classified HashJack as low severity and won't fix it, Perplexity and Microsoft have issued patches for their browsers. The findings prompt a reevaluation of security protocols surrounding AI-driven browser functions, emphasizing the need for robust safeguards against indirect manipulations.
Details