Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12629

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-12-04 15:06:23 theregister VULNERABILITIES Microsoft Silently Patches Long-Exploited Windows Shortcut Vulnerability
Microsoft has addressed a critical vulnerability in Windows shortcut files (CVE-2025-9491) that allowed hidden command execution, exploited by both cybercriminals and state-sponsored groups since 2017. The flaw facilitated espionage by concealing malicious commands in .lnk files, which appeared harmless when viewed in Windows, enabling covert code execution. Trend Micro identified nearly a thousand malicious .lnk samples, with 11 state-sponsored groups from North Korea, Iran, Russia, and China exploiting the flaw for cyber espionage and data theft. Despite initial resistance from Microsoft, a silent patch was implemented in November 2025, revealing full command details in Windows' "Properties" dialog to prevent obfuscation. Recent attacks by the China-linked group UNC6384 targeted European diplomatic entities using spear-phishing emails, leading to the deployment of the PlugX remote access trojan. The persistence of this vulnerability, despite the patch, indicates that many systems may still be at risk until fully updated, highlighting the need for comprehensive patch management. This incident demonstrates the ongoing threat posed by seemingly innocuous file formats and the importance of vigilance against social engineering tactics.
Details
2025-12-04 13:11:36 theregister DDOS Aisuru Botnet Drives Record-Breaking DDoS Attacks in Q3 2025
The Aisuru botnet launched unprecedented DDoS attacks in Q3 2025, peaking at 29.7 Tbps, significantly stressing global internet infrastructure. Cloudflare's data shows a substantial 87% increase in network-layer attacks, with Aisuru responsible for 2,867 incidents, including 1,304 hyper-volumetric attacks. Aisuru's botnet, comprising up to 4 million infected devices, executed 14 hyper-volumetric attacks daily, marking a 54% increase from the previous quarter. The botnet's attacks utilized "UDP carpet-bombing," targeting 15,000 destination ports per second, effectively bypassing traditional defenses. Sectors such as generative AI, mining, and automotive faced heightened DDoS activity, driven by geopolitical tensions and increased regulatory focus. Attack origins predominantly stemmed from Asia, with Indonesia leading for the second year, reflecting a shift in the geographical landscape of DDoS sources. The rapid execution of these attacks, often concluding in under ten minutes, challenges the efficacy of on-demand mitigation services. The commodification of Aisuru's capabilities poses a significant threat, enabling cybercriminals to deploy massive DDoS attacks for minimal cost.
Details
2025-12-04 12:02:21 thehackernews DATA BREACH Yearn Finance Exploit Results in $9 Million DeFi Theft
An exploit targeting Yearn Finance's yETH pool on Ethereum led to the theft of approximately $9 million by unidentified attackers. The breach exploited a flaw in the protocol's internal accounting, specifically a cache issue that wasn't cleared when the pool was emptied. Attackers minted 235 septillion yETH tokens with only 16 wei deposited, marking one of the most capital-efficient exploits in DeFi history. This incident underscores the critical need for rigorous auditing and security measures in decentralized finance platforms. The attack highlights the ongoing vulnerabilities within DeFi protocols, which can lead to significant financial losses. Organizations in the DeFi sector must prioritize security and regularly update systems to prevent similar exploits.
Details
2025-12-04 11:34:08 thehackernews VULNERABILITIES Five Key Threats Redefining Web Security in 2025
The year 2025 saw a paradigm shift in web security, driven by AI-powered attacks, supply chain risks, and evolving injection techniques, challenging traditional defense strategies. Vibe coding, a new AI-driven development approach, introduced vulnerabilities due to its ability to bypass conventional security checks, impacting platforms like Base44. A massive JavaScript injection campaign compromised 150,000 websites, exploiting client-side vulnerabilities and demonstrating the critical need for advanced defense mechanisms. Magecart attacks increased by 103%, with sophisticated techniques such as DOM shadow manipulation and geofencing, highlighting the limitations of traditional security measures. AI supply chain attacks surged, with polymorphic malware and context-aware code evading standard detection, leading to widespread compromises in open-source repositories. Web privacy validation issues exposed 70% of top US websites to compliance risks, with unauthorized data tracking and cookie mismanagement leading to potential legal liabilities. The EU AI Act and PCI DSS updates are driving organizations to adopt proactive security measures, including continuous monitoring and AI-specific defenses, to mitigate emerging threats.
Details
2025-12-04 09:28:21 thehackernews CYBERCRIME GoldFactory Cybercriminals Exploit Modified Banking Apps in Southeast Asia
GoldFactory, a financially motivated cybercrime group, targets mobile users in Indonesia, Thailand, and Vietnam by distributing modified banking apps to spread Android malware. Group-IB reports over 11,000 infections linked to these malicious apps, with 63% affecting the Indonesian market through impersonation of government services and local brands. The attack involves remote access trojans like Gigabud, MMRat, and Remo, which exploit Android's accessibility services for remote control and data extraction. Cybercriminals use runtime hooking techniques with frameworks like Frida, Dobby, and Pine to inject malicious code while retaining the original app's functionality. GoldFactory's infrastructure includes a new malware variant, Gigaflower, capable of real-time device activity streaming and personal data harvesting via fake system prompts. The group has shifted from iOS to Android due to stricter iOS security measures, instructing victims to use borrowed Android devices for continued exploitation. The campaign's sophistication and low-cost approach enable rapid scaling and evasion of traditional detection mechanisms, posing a significant threat to regional financial systems.
Details
2025-12-04 06:52:51 thehackernews DDOS Cloudflare Mitigates Record-Breaking 29.7 Tbps DDoS Attack
Cloudflare successfully mitigated the largest DDoS attack recorded, reaching 29.7 terabits per second, originating from the AISURU botnet. The attack, lasting 69 seconds, targeted an undisclosed entity, with AISURU linked to numerous high-volume DDoS incidents over the past year. AISURU operates with an estimated 1-4 million infected hosts globally, focusing on telecoms, gaming, hosting, and financial services sectors. The attack utilized UDP carpet-bombing, targeting an average of 15,000 destination ports per second, with randomized packet attributes to bypass defenses. Cloudflare has mitigated 2,867 AISURU attacks in 2025, including 1,304 hyper-volumetric attacks in Q3 alone, reflecting a 15% increase from the previous quarter. The rise in DDoS attack frequency and sophistication poses significant challenges for organizations, necessitating advanced defensive strategies. The total number of thwarted DDoS attacks in 2025 reached 36.2 million, underscoring the escalating threat landscape and the need for robust cybersecurity measures.
Details
2025-12-04 04:36:34 theregister VULNERABILITIES TLS 1.3 Enhancements and Tradeoffs in Forward Secrecy
TLS 1.3 introduces improvements in network security but presents tradeoffs, particularly concerning forward secrecy and the use of 0-RTT data. Forward secrecy ensures no long-lived secrets can decrypt past sessions, but 0-RTT data uses keys derived from long-lived secrets, posing potential risks. The RFC for TLS does not clearly define forward secrecy, leading to confusion; upcoming revisions aim to clarify these issues. The tradeoff between performance and security in TLS reflects broader system design challenges, balancing latency with threat models. Applications using TLS must decide on configurations, such as opting for 0-RTT data, which impacts security and performance. The evolution of TLS, HTTP, and QUIC over three decades showcases the complexity of building secure systems with adaptable components. Authors Larry Peterson and Bruce Davie emphasize a systems approach to security, highlighting the importance of understanding tradeoffs in protocol design.
Details
2025-12-04 01:18:26 theregister VULNERABILITIES Rust Core Library Achieves IEC 61508 SIL 2 Certification
Ferrous Systems has secured IEC 61508 SIL 2 certification for parts of the Rust core library, enhancing its application in safety-critical systems. The certification enables broader adoption of Rust in industries requiring high reliability, such as industrial robotics and safety systems. Rust's memory safety features aim to reduce memory-related errors, offering a more stable alternative to C/C++ in embedded systems. The Ferrocene toolchain, used for this certification, supports development on platforms like x86_64 Linux and Armv8-A RTOS. TÜV SÜD has approved the Ferrocene toolchain for safety-focused development, aligning with standards like ISO 26262 and IEC 61508. Partners Sonair and Kiteshield are leveraging the certified Rust library for advanced safety applications in robotics and mining. This development signifies a shift towards more secure and reliable software in sectors where system failures could have severe consequences.
Details
2025-12-03 22:11:39 bleepingcomputer DATA BREACH Marquis Software Data Breach Affects 74 US Financial Institutions
Marquis Software Solutions experienced a data breach impacting over 74 banks and credit unions across the United States, affecting more than 400,000 customers. The breach occurred on August 14, 2025, when hackers exploited a vulnerability in Marquis's SonicWall firewall, allowing unauthorized access to sensitive information. Compromised data includes names, addresses, Social Security numbers, financial account details, and dates of birth, posing significant identity theft risks. Marquis has filed breach notifications with various state Attorney General offices, detailing the extent of the data exposure and affected individuals. Although no misuse of data has been confirmed, reports suggest Marquis paid a ransom to prevent the dissemination of stolen information. The Akira ransomware group is suspected, known for exploiting SonicWall vulnerabilities to infiltrate networks and deploy ransomware. In response, Marquis has enhanced its security measures, including strengthening VPN security and implementing additional network protections. This incident underscores the critical need for robust cybersecurity practices and timely patch management to prevent similar breaches.
Details
2025-12-03 21:57:29 theregister VULNERABILITIES Critical React Vulnerability Threatens 39% of Cloud Environments
A severe vulnerability in the React JavaScript library, CVE-2025-55182, enables unauthenticated remote code execution, affecting 39% of cloud environments using React and related frameworks. The flaw impacts React versions 19.0, 19.1.0, 19.1.1, and 19.2.0, as well as frameworks like Next.js, with exploitation likely imminent due to ease of abuse. The React team has released patches for affected versions, urging immediate upgrades to mitigate potential exploitation risks. Vercel, maintainer of Next.js, issued its own CVE (CVE-2025-66478) and corresponding patch, emphasizing the critical nature of this security threat. The vulnerability arises from improper decoding of payloads in React Server Function endpoints, allowing crafted HTTP requests to execute malicious code. Meta and the React team responded swiftly, deploying an emergency patch within four days of the flaw's disclosure by researcher Lachlan Davidson. Organizations using React are advised to apply patches immediately, as the vulnerability's widespread impact and ease of exploitation pose significant security risks. Cloudflare's Web Application Firewall may offer some protection, but direct patching remains essential to safeguard against potential attacks.
Details
2025-12-03 21:32:12 bleepingcomputer VULNERABILITIES Critical Vulnerabilities in WordPress Plugins Pose Significant Risks
A critical privilege escalation flaw, CVE-2025–8489, in the King Addons for Elementor plugin allows attackers to gain administrative access on WordPress sites, affecting approximately 10,000 websites. The vulnerability was actively exploited starting October 31, with over 48,400 attempts blocked by Wordfence, a security service for WordPress, highlighting the urgency of the threat. Attackers exploit the flaw by sending crafted requests to create rogue admin accounts, with peak activity noted between November 9 and 10 from two primary IP addresses. Website administrators are urged to upgrade to version 51.1.35 of King Addons, which resolves the vulnerability, to prevent unauthorized access. Another critical flaw, CVE-2025-13486, in the Advanced Custom Fields: Extended plugin affects over 100,000 sites, enabling unauthenticated attackers to execute arbitrary code. This vulnerability was addressed in version 0.9.2 of the plugin, released promptly after discovery, emphasizing the need for rapid response to reported security issues. Website owners are advised to update to the latest plugin versions or disable affected plugins to mitigate potential exploitation and maintain site security.
Details
2025-12-03 20:55:31 bleepingcomputer DATA BREACH Leroy Merlin Reports Data Breach Affecting French Customer Information
Leroy Merlin, a major DIY retailer, disclosed a data breach affecting its French customer base, compromising personal information but excluding banking data and passwords. The breach impacts customers in France, with the company operating across Europe, South Africa, and Brazil, generating $9.9 billion in annual revenue. Upon detection, Leroy Merlin implemented measures to block unauthorized access and contain the breach, minimizing potential damage. The compromised data has not been used maliciously, and there is no evidence of it being leaked online or used for extortion. Customers have been advised to remain vigilant against phishing attempts and report any suspicious account activity or issues with loyalty discounts. BleepingComputer confirmed the authenticity of the notification and is seeking further details from Leroy Merlin about the breach's scope. No ransomware group has claimed responsibility for the attack, and the situation remains under investigation.
Details
2025-12-03 20:30:23 bleepingcomputer DATA BREACH Freedom Mobile Data Breach Exposes Customer Information in Canada
Freedom Mobile, a major Canadian wireless carrier, reported a data breach impacting its customer account management platform, compromising personal data of an unspecified number of customers. The breach was detected on October 23, with attackers exploiting a subcontractor's account to access sensitive customer information, including names, addresses, and phone numbers. Freedom Mobile swiftly responded by blocking suspicious accounts and IP addresses, implementing security enhancements to prevent further unauthorized access. While there is no evidence of data misuse, customers are advised to remain vigilant against phishing attempts and monitor their accounts for unusual activity. The breach follows a similar incident in 2019, where a vendor exposed data of 15,000 customers, highlighting ongoing challenges in securing customer information. Freedom Mobile, acquired by Vidéotron in 2023, has not disclosed the exact number of affected customers or whether a ransom was demanded. This incident underscores the importance of robust subcontractor management and continuous security improvements in safeguarding customer data.
Details
2025-12-03 18:26:13 thehackernews VULNERABILITIES Critical RSC Bugs in React and Next.js Enable Remote Code Execution
A maximum-severity flaw, CVE-2025-55182, was disclosed in React Server Components, allowing unauthenticated remote code execution with a CVSS score of 10.0. The vulnerability arises from unsafe deserialization of RSC payloads, potentially enabling attackers to execute arbitrary JavaScript code on servers. Affected React versions include 19.0, 19.1.0, 19.1.1, and 19.2.0, with patches available in versions 19.0.1, 19.1.2, and 19.2.1. Next.js is also impacted, with CVE-2025-66478 affecting versions >=14.3.0-canary.77, >=15, and >=16; patches are available in multiple versions up to 16.0.7. The flaw affects libraries bundling RSC, such as Vite RSC plugin and RedwoodJS, with 39% of cloud environments potentially vulnerable. Security researcher Lachlan Davidson discovered the flaw, emphasizing the need for immediate patching to mitigate risks. Organizations are urged to apply the available patches promptly to protect against potential exploitation.
Details
2025-12-03 17:53:50 thehackernews VULNERABILITIES Microsoft Patches Long-Standing Windows LNK Vulnerability Exploited by State Actors
Microsoft addressed a Windows LNK file vulnerability, CVE-2025-9491, in its November 2025 Patch Tuesday updates, a flaw exploited since 2017 by multiple threat actors. The vulnerability allowed remote code execution by concealing malicious commands within LNK files, impacting users who interacted with these disguised shortcuts. Exploitation involved state-sponsored groups from China, Iran, North Korea, and Russia, targeting entities for data theft and espionage, with campaigns dating back several years. Microsoft initially deemed the flaw not critical for immediate patching, citing existing warnings in Microsoft Office applications against opening untrusted LNK files. The patch now ensures the full command string within LNK files is visible, mitigating risks of concealed malicious content, while 0patch offers a micropatch with additional warnings. The issue's exploitation by the XDSpy group and others underlines the persistent threat posed by unpatched vulnerabilities in widely used software. Organizations are advised to update systems promptly and remain vigilant against LNK file-based threats, reinforcing the need for robust security measures and user education.
Details