Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12631

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-12-03 18:26:13 thehackernews VULNERABILITIES Critical RSC Bugs in React and Next.js Enable Remote Code Execution
A maximum-severity flaw, CVE-2025-55182, was disclosed in React Server Components, allowing unauthenticated remote code execution with a CVSS score of 10.0. The vulnerability arises from unsafe deserialization of RSC payloads, potentially enabling attackers to execute arbitrary JavaScript code on servers. Affected React versions include 19.0, 19.1.0, 19.1.1, and 19.2.0, with patches available in versions 19.0.1, 19.1.2, and 19.2.1. Next.js is also impacted, with CVE-2025-66478 affecting versions >=14.3.0-canary.77, >=15, and >=16; patches are available in multiple versions up to 16.0.7. The flaw affects libraries bundling RSC, such as Vite RSC plugin and RedwoodJS, with 39% of cloud environments potentially vulnerable. Security researcher Lachlan Davidson discovered the flaw, emphasizing the need for immediate patching to mitigate risks. Organizations are urged to apply the available patches promptly to protect against potential exploitation.
Details
2025-12-03 17:53:50 thehackernews VULNERABILITIES Microsoft Patches Long-Standing Windows LNK Vulnerability Exploited by State Actors
Microsoft addressed a Windows LNK file vulnerability, CVE-2025-9491, in its November 2025 Patch Tuesday updates, a flaw exploited since 2017 by multiple threat actors. The vulnerability allowed remote code execution by concealing malicious commands within LNK files, impacting users who interacted with these disguised shortcuts. Exploitation involved state-sponsored groups from China, Iran, North Korea, and Russia, targeting entities for data theft and espionage, with campaigns dating back several years. Microsoft initially deemed the flaw not critical for immediate patching, citing existing warnings in Microsoft Office applications against opening untrusted LNK files. The patch now ensures the full command string within LNK files is visible, mitigating risks of concealed malicious content, while 0patch offers a micropatch with additional warnings. The issue's exploitation by the XDSpy group and others underlines the persistent threat posed by unpatched vulnerabilities in widely used software. Organizations are advised to update systems promptly and remain vigilant against LNK file-based threats, reinforcing the need for robust security measures and user education.
Details
2025-12-03 17:36:12 bleepingcomputer MISCELLANEOUS Russia Blocks Roblox Over Alleged Distribution of Inappropriate Content
Russia's Roskomnadzor has blocked access to Roblox, citing the platform's alleged distribution of LGBT and extremist content, impacting users across Russia. The decision follows repeated claims that Roblox failed to prevent the dissemination of unsafe materials, including content promoting illegal activities. Roblox, a popular global gaming platform with over 1 billion Android downloads, faces significant operational challenges due to this restriction. The ban is part of Russia's broader strategy to control online content, previously targeting messaging apps like WhatsApp, Viber, and Signal for similar reasons. Roskomnadzor's actions reflect ongoing tensions between digital platforms and regulatory bodies over content moderation and compliance with national laws. This move may lead to increased scrutiny on other international platforms operating in Russia, affecting their business operations and user engagement. Companies should prepare for potential regulatory actions by enhancing content moderation capabilities and ensuring compliance with local regulations.
Details
2025-12-03 17:29:58 bleepingcomputer VULNERABILITIES Google Enhances Android Scam Protection for U.S. Financial Apps
Google has expanded its Android in-call scam protection feature to include U.S. fintech apps like Cash App and JPMorgan Chase, aiming to safeguard millions of users from phone-based scams. The feature alerts users when launching financial apps during calls with unknown numbers, warning against potential impersonation scams targeting banking information. A persistent 30-second warning pop-up advises users to end suspicious calls, aiming to disrupt social engineering tactics used by scammers. Initially trialed in the U.K., the feature has already aided thousands in avoiding costly scams and is now being tested in the U.S. market. The scam protection is available on Android 11 and later versions, requiring users to remain vigilant against risky actions such as installing unofficial APKs. Users are encouraged to verify account statuses directly with banks and avoid sharing personal information with unknown callers to enhance security.
Details
2025-12-03 17:09:38 thehackernews VULNERABILITIES WordPress King Addons Plugin Vulnerability Exploited for Admin Access
A critical flaw in the King Addons for Elementor plugin allows attackers to gain administrative access on WordPress sites. The vulnerability is identified as CVE-2025-8489 with a CVSS score of 9.8. The issue affects plugin versions 24.12.92 through 51.1.14 and enables privilege escalation through improper role restrictions during user registration. Attackers can exploit this flaw by sending crafted HTTP requests to the "/wp-admin/admin-ajax.php" endpoint, specifying the administrator role. Over 10,000 active installations of the plugin are at risk, potentially allowing attackers to upload malicious code or conduct other harmful activities. The vulnerability was patched in version 51.1.35, released on September 25, 2025, following its discovery by security researcher Peter Thaleikis. Wordfence has blocked over 48,400 exploit attempts since the flaw's disclosure, with mass exploitation beginning on November 9, 2025. Site administrators are urged to update to the latest plugin version, audit for unauthorized admin accounts, and monitor for unusual activity.
Details
2025-12-03 17:04:01 bleepingcomputer VULNERABILITIES Google Expands In-Call Scam Protection to U.S. Bank Apps
Google has extended its Android in-call scam protection feature to include major U.S. financial apps such as Cash App and JPMorgan Chase, aiming to enhance user security. This feature, introduced with Android 16, alerts users when they are on a call with an unknown number while using a financial app, warning against potential impersonation scams. Users receive a 30-second warning pop-up advising them to end the call, aiming to disrupt the attacker's social-engineering tactics and prevent unauthorized financial transactions. Initially trialed in the U.K., the feature has reportedly helped thousands avoid financial losses and is now being tested across the U.S., Brazil, and India. The protection system is available on Android 11 and later versions, reinforcing the importance of keeping mobile operating systems up to date for optimal security. Users are encouraged to remain vigilant against risky actions prompted by unknown callers, such as installing unofficial apps or disabling security features like Play Protect. This initiative reflects Google's ongoing commitment to safeguarding users against evolving cyber threats, particularly those exploiting social engineering techniques.
Details
2025-12-03 16:57:07 bleepingcomputer VULNERABILITIES Microsoft Mitigates Windows LNK Vulnerability Exploited by Hackers
Microsoft has addressed a high-severity Windows LNK vulnerability, CVE-2025-9491, exploited by state-backed and cybercrime groups in zero-day attacks. The flaw allows attackers to hide malicious commands in Windows LNK files, requiring user interaction to execute malware on compromised devices. Threat actors, including Evil Corp and Mustang Panda, have distributed malicious LNK files in archives to bypass email security measures. Microsoft's mitigation involves displaying all characters in the Target field of LNK files, but it doesn't remove malicious arguments or provide user warnings. ACROS Security released an unofficial patch via 0Patch, limiting shortcut target strings to 260 characters and alerting users to potential threats. The vulnerability has been exploited in attacks targeting European diplomats, deploying malware such as PlugX RAT and complicating the threat landscape. The issue remains a concern as Microsoft's silent mitigation may not fully protect users, prompting reliance on third-party patches for enhanced security.
Details
2025-12-03 15:40:43 thehackernews MALWARE Water Saci Banking Trojan Exploits WhatsApp for Rapid Propagation
The Water Saci threat actor has launched a sophisticated campaign targeting Brazilian users with a banking trojan, utilizing WhatsApp for rapid malware spread. The attack chain involves HTA files and PDFs, leveraging AI to transition from PowerShell to Python, enhancing the malware's propagation capabilities. Users receive deceptive messages from trusted contacts, prompting interaction with malicious attachments that initiate the infection process. The trojan monitors active windows for banking activity, using AutoIt scripts to maintain persistence and evade detection through anti-virtualization checks. The campaign's use of WhatsApp Web and browser automation tools signifies a strategic shift in exploiting trusted communication platforms for malware delivery. A separate RelayNFC Android malware campaign targets Brazilian users, conducting NFC relay attacks to capture and misuse contactless payment data. These developments indicate a growing sophistication in cybercriminal tactics in Brazil, emphasizing the need for enhanced security measures and user awareness.
Details
2025-12-03 15:21:25 bleepingcomputer CYBERCRIME DragonForce and Scattered Spider Forge Potent Ransomware Alliance
Security researchers have analyzed DragonForce ransomware, which emerged in 2023 and has evolved into a "ransomware cartel" with global operations and increased attack frequency. DragonForce's latest variant exploits drivers like truesight.sys to disable security measures, enhancing its encryption capabilities by fixing previous vulnerabilities linked to Akira ransomware. The group collaborates with Scattered Spider, a threat actor known for advanced social engineering, to execute high-profile breaches, including a notable attack on Marks & Spencer. DragonForce operates as a ransomware-as-a-service (RaaS), offering affiliates 80% of profits and customizable tools, which lowers entry barriers for aspiring cybercriminals. Scattered Spider employs tactics such as MFA fatigue and SIM swapping to gain initial access, using remote monitoring tools to maintain persistence and conduct thorough reconnaissance. The cartel's strategy of combining specialized skills in social engineering and ransomware deployment complicates defensive efforts for organizations worldwide. Security professionals are urged to implement phishing-resistant MFA and robust endpoint detection to counteract these sophisticated, multi-stage cyber threats.
Details
2025-12-03 14:04:17 bleepingcomputer DDOS Aisuru Botnet Sets New Record with 29.7 Tbps DDoS Attack
The Aisuru botnet launched a record-breaking DDoS attack peaking at 29.7 Tbps, showcasing the growing threat of hyper-volumetric attacks. Cloudflare successfully mitigated the attack, which lasted 69 seconds and targeted an undisclosed entity using UDP carpet-bombing tactics. Aisuru operates as a botnet-for-hire service, leveraging compromised routers and IoT devices, with estimates of up to four million infected hosts globally. The botnet's attacks have disrupted internet service providers, indicating the potential for significant impact on critical infrastructure and services. Cloudflare reports a 227% increase in DDoS attacks exceeding 1 Tbps quarter-over-quarter, with 1,304 hyper-volumetric incidents recorded in Q3 2025 alone. The attacks primarily originate from countries like Indonesia and Thailand, targeting sectors such as telecommunications, gaming, and financial services. The rapid and short-lived nature of these attacks poses challenges for defenders, highlighting the need for robust, proactive DDoS mitigation strategies.
Details
2025-12-03 13:31:23 bleepingcomputer DATA BREACH University of Phoenix Data Breach Tied to Clop Ransomware Campaign
The University of Phoenix disclosed a data breach linked to a Clop ransomware campaign exploiting Oracle E-Business Suite vulnerabilities, impacting students, staff, and suppliers. Sensitive data, including names, social security numbers, and bank details, were accessed without authorization, posing significant privacy concerns for affected individuals. The breach was detected on November 21, after the attackers listed the university on their data leak site, prompting immediate notification to regulatory bodies and affected parties. The incident is part of a broader campaign targeting multiple U.S. universities and companies, including Harvard University and GlobalLogic, through a zero-day vulnerability in Oracle EBS. The Clop ransomware group has a history of exploiting software vulnerabilities, previously targeting platforms like GoAnywhere MFT and MOVEit Transfer, affecting thousands of organizations. The University of Phoenix is coordinating with regulatory entities and preparing to notify impacted individuals with guidance on protective measures. This breach underscores the critical need for robust cybersecurity measures and timely patch management to protect against sophisticated cyber threats.
Details
2025-12-03 12:00:09 thehackernews CYBERCRIME AI Tools Revolutionizing Phishing Tactics and Cybercrime Accessibility
Cybercriminals are leveraging AI tools to create sophisticated phishing campaigns, significantly lowering the barrier to entry for launching attacks. Even individuals with minimal technical skills can now execute phishing operations comparable to those of state-sponsored hackers. Traditional email filters are becoming ineffective as AI-generated emails can mimic legitimate communications with high accuracy. The dark web is facilitating the sale of advanced AI phishing tools, transforming the threat landscape for organizations. Current defensive strategies focusing on detection are challenged by AI's ability to constantly alter email signatures. Organizations are urged to adopt proactive defense measures that render phishing attempts ineffective, even if users interact with malicious content. The emphasis is shifting towards intelligence-driven defenses to counteract the scalability of AI-driven cyber threats.
Details
2025-12-03 09:58:53 thehackernews MISCELLANEOUS Leveraging AI in Cybersecurity: Enhancing Human Decision-Making
The article explores the evolving role of AI in cybersecurity, comparing it to historical technological shifts, emphasizing the need for adaptation rather than resistance. AI is increasingly integrated into security products, yet its proprietary nature often limits transparency, posing challenges for security teams. Security professionals are encouraged to develop AI-assisted workflows to enhance control over decision-making processes, countering potential blind spots. AI can streamline routine tasks, allowing security teams to focus on higher-order reasoning and strategic decision-making. While AI can process vast data efficiently, it lacks the ability to fully understand organizational context and ethical nuances, underscoring the continued importance of human oversight. Professionals are advised to gain fluency in Python and core machine learning concepts to effectively harness AI's capabilities and refine its outputs. The article advocates for a strategic approach to AI, transforming it from an opaque tool into a transparent and directed asset within cybersecurity operations.
Details
2025-12-03 09:33:06 thehackernews VULNERABILITIES Critical Flaws in Picklescan Expose PyTorch Models to Code Execution
JFrog researchers discovered three critical vulnerabilities in Picklescan, an open-source tool designed to detect malicious code in Python pickle files used by PyTorch models. These flaws allow attackers to bypass Picklescan's protections, enabling arbitrary code execution and potentially facilitating large-scale supply chain attacks. Picklescan works by examining bytecode and checking against a blocklist, but this method fails to detect new attack vectors, leaving systems vulnerable. The vulnerabilities can be exploited by embedding malicious payloads in PyTorch models, introducing CRC errors, or using common PyTorch extensions to evade detection. Following responsible disclosure, the vulnerabilities were patched in Picklescan version 0.0.31, released on September 9, 2025. The incident underscores the risks associated with relying on a single security tool and highlights the need for adaptive, intelligence-driven protection strategies in AI model security. Organizations are advised to ensure they load only trusted models and consider additional security measures beyond existing scanning tools to mitigate emerging threats.
Details
2025-12-03 08:46:58 thehackernews MALWARE Malicious Rust Package Targets Web3 Developers with Cross-Platform Malware
A Rust package named "evm-units" was discovered to deliver malware targeting Windows, macOS, and Linux systems, posing as an Ethereum Virtual Machine utility. The package, uploaded to crates.io in April 2025, was downloaded over 7,000 times before removal, affecting Web3 developers globally. Another package, "uniswap-utils," listed "evm-units" as a dependency, increasing the reach of the malicious code with over 7,400 downloads. The malware checks for the presence of Qihoo 360 antivirus software and alters its execution method based on its detection, indicating a focus on Chinese targets. The malicious code fetches additional payloads from an external URL, exploiting the supply chain to execute during package initialization. The incident underscores the vulnerability of software repositories and the need for stringent security measures in package management. Organizations are advised to review dependencies and implement robust monitoring to prevent similar supply chain attacks in the future.
Details