Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11755

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-09-30 14:59:41 bleepingcomputer NATION STATE ACTIVITY Chinese State-Sponsored Group Exploits VMware Zero-Day Vulnerability
Broadcom has patched a high-severity privilege escalation vulnerability in VMware Aria Operations and VMware Tools, exploited since October 2024 by Chinese state-sponsored group UNC5174. The vulnerability, CVE-2025-41244, allows unprivileged local attackers to escalate privileges by executing malicious binaries within specific file paths. NVISO released a proof-of-concept exploit demonstrating how attackers can gain root-level code execution on affected systems. UNC5174, linked to China's Ministry of State Security, has previously targeted U.S. defense contractors and UK government entities, selling network access. The group has exploited multiple vulnerabilities, including those in F5 BIG-IP and ConnectWise ScreenConnect, impacting hundreds of institutions across the U.S. and Canada. Other Chinese threat actors have participated in similar campaigns, compromising over 580 SAP NetWeaver instances, including critical infrastructure in the UK and U.S. Broadcom also addressed additional VMware vulnerabilities reported by the NSA, reflecting ongoing efforts to secure their software against active threats.
Details
2025-09-30 14:10:12 bleepingcomputer MISCELLANEOUS VMware Certifications Enhance IT Security and Operational Competence
The demand for VMware certifications is increasing as organizations navigate complex hybrid infrastructures and multi-cloud environments, making certification a critical requirement rather than a mere resume enhancement. Certified professionals bring significant financial value, with 22% of organizations estimating a single certified employee adds $30,000 or more in value annually. Misconfigurations are a leading cause of security breaches; VMware certifications equip professionals to prevent such incidents by embedding security expertise into their training. Certification ensures consistent management across diverse environments, enabling teams to deploy, integrate, and troubleshoot with a shared methodology. For individuals, certification enhances career resilience, providing verified expertise that aligns with trusted platforms, making them more competitive in the job market. Organizations benefit from certification by establishing a baseline of competency, reducing risk, and improving morale through validated employee growth. VMUG Advantage offers resources, discounts, and a community to support certification efforts, facilitating scalable certification across teams for sustainable organizational value.
Details
2025-09-30 13:47:53 bleepingcomputer VULNERABILITIES CISA Alerts on Critical Linux Sudo Vulnerability Exploited in Attacks
CISA has identified active exploitation of a critical Linux vulnerability (CVE-2025-32463) in the sudo package, which allows unauthorized root-level command execution. Federal agencies are mandated to apply mitigations by October 20 or cease using the affected sudo versions to mitigate potential risks. The vulnerability affects sudo versions 1.9.14 through 1.9.17 and has a critical severity score of 9.3, posing significant security concerns. Exploitation involves using the -R (--chroot) option to escalate privileges, bypassing the sudoers list configuration. Researcher Rich Mirch released a proof-of-concept exploit, with additional exploits emerging publicly, indicating widespread exposure. Organizations should consult CISA’s Known Exploited Vulnerabilities catalog for patching priorities and security measures to counteract potential attacks. The flaw impacts default sudo configurations, making it a critical issue for Linux systems globally, necessitating urgent attention and action.
Details
2025-09-30 13:21:12 thehackernews VULNERABILITIES Google Patches Critical Vulnerabilities in Gemini AI Assistant
Cybersecurity researchers identified three vulnerabilities in Google's Gemini AI, potentially exposing users to privacy risks and data theft through prompt injection and cloud exploits. The vulnerabilities, named the Gemini Trifecta, affected the Search Personalization Model, Cloud Assist, and Browsing Tool, enabling unauthorized data exfiltration. Attack scenarios included using prompt injections to manipulate Gemini into querying sensitive data and embedding it into malicious requests. Google responded by ceasing hyperlink rendering in log summarization and enhancing security measures to prevent prompt injection attacks. The incident emphasizes the need for robust security measures as AI tools become integral to business operations, highlighting AI's dual role as both target and attack vector. The case follows a broader trend of exploiting AI agents, as seen in a separate attack using Notion's AI for data exfiltration through hidden prompt instructions. Organizations are urged to maintain visibility and enforce strict policies to secure AI environments against evolving threats.
Details
2025-09-30 13:04:43 thehackernews MISCELLANEOUS Microsoft Enhances Sentinel with Unified Data Lake and AI Integration
Microsoft has expanded its Sentinel platform into a unified agentic security solution, introducing a general availability of the Sentinel data lake to enhance security incident management. The Sentinel data lake, initially released in public preview, enables ingestion, management, and analysis of security data, offering advanced analytics and improved visibility. New features include Sentinel Graph and Sentinel Model Context Protocol (MCP) server, which provide graph-based context and semantic access to security data. These enhancements aim to empower AI models, like Security Copilot, to detect subtle patterns, correlate signals, and generate high-fidelity alerts for improved threat detection. The platform's integration with Defender and Purview allows security teams to trace attack paths, understand impacts, and prioritize responses within familiar workflows. Microsoft's approach shifts cybersecurity from reactive to predictive, enabling proactive threat hunting and automatic detection based on the latest tradecraft. Upcoming enhancements to Azure AI Foundry will focus on securing AI platforms, including protections against cross-prompt injection attacks.
Details
2025-09-30 12:15:26 bleepingcomputer VULNERABILITIES Broadcom Patches Critical VMware NSX Vulnerabilities Reported by NSA
Broadcom addressed two high-severity vulnerabilities in VMware NSX, identified by the NSA, which could allow attackers to enumerate usernames for potential brute-force attacks. The vulnerabilities, tracked as CVE-2025-41251 and CVE-2025-41252, involve weaknesses in password recovery and username enumeration, posing risks of unauthorized access. Additional updates fixed a high-severity SMTP header injection flaw in VMware vCenter, potentially allowing manipulation of notification emails by non-administrative users. Broadcom disclosed further vulnerabilities in VMware Aria Operations and Tools, enabling privilege escalation and unauthorized access to guest VMs. Earlier this year, Broadcom patched several VMware vulnerabilities exploited as zero-days during the Pwn2Own Berlin 2025 contest, emphasizing the ongoing threat landscape. State-sponsored and cybercrime groups frequently target VMware products due to their widespread use in handling sensitive corporate data. Organizations are urged to apply these patches promptly to mitigate potential exploitation risks and safeguard their virtualized environments.
Details
2025-09-30 11:30:24 thehackernews MISCELLANEOUS Transforming SOC Operations: From Alert Overload to Contextual Clarity
Traditional Security Operations Centers (SOCs) face challenges with overwhelming alert volumes, hindering effective incident response and leaving gaps for attackers to exploit. Legacy SOCs often rely on a rule-based model, generating raw signals that analysts struggle to piece together, delaying threat identification and response. A new approach emphasizes context-driven analysis, integrating logs from various sources to create coherent investigations that enhance threat detection. By enriching signals with user history and IP reputation, SOCs can transform isolated alerts into meaningful narratives, improving incident response times. The introduction of CognitiveSOC™ by Conifers leverages AI to automate and scale investigations, reducing false positives and improving mean time to resolution (MTTR). This AI-driven platform allows analysts to focus on strategic decision-making, utilizing institutional knowledge rather than being bogged down by alert triage. Organizations adopting this model report significant improvements in SOC performance, including faster, higher-quality investigations and reduced alert fatigue.
Details
2025-09-30 10:57:35 thehackernews VULNERABILITIES China-Linked Group Exploits VMware Zero-Day for Privilege Escalation
NVISO Labs identified a zero-day vulnerability, CVE-2025-41244, in VMware Tools, exploited by the China-linked group UNC5174 since October 2024. The flaw allows local privilege escalation on VMs with VMware Tools, potentially granting root access to non-administrative users. NVISO credited researcher Maxime Thiebaut with discovering the vulnerability during an incident response in May 2025. VMware released patches for Windows systems and plans to distribute Linux updates through open-vm-tools to address the issue. The exploitation involves mimicking system binaries, enabling unprivileged users to execute code in elevated contexts. The vulnerability's exploitation method suggests other malware may have inadvertently used similar privilege escalation techniques. Organizations using VMware Tools should apply the latest patches promptly to mitigate potential security risks.
Details
2025-09-30 10:04:53 theregister MISCELLANEOUS UK Government Advocates Nationwide Rollout of Facial Recognition Technology
The UK government plans to expand the use of live facial recognition (LFR) technology across police forces in England and Wales, following successful trials in South London. Policing Minister Sarah Jones announced the initiative, emphasizing the need for clear guidance on the technology's application, with official guidelines expected later this year. The Metropolitan Police's permanent LFR cameras in Croydon have reportedly facilitated numerous arrests, demonstrating the technology's potential value in law enforcement. Seven additional police forces will soon deploy LFR-equipped vans, joining the Metropolitan and South Wales Police, which have already made 580 arrests using the technology. Current LFR use focuses on identifying individuals on watchlists, with officers exercising discretion on whether to act on matches, rather than indiscriminately stopping individuals. Concerns persist about LFR's accuracy, particularly in misidentifying individuals from minority groups, as highlighted by a recent legal challenge involving a misidentified Black individual. Privacy advocates, including Big Brother Watch, continue to challenge LFR's deployment, citing potential civil liberties infringements and calling for structural changes in its use.
Details
2025-09-30 09:34:26 theregister CYBERCRIME Landmark Bitcoin Fraud Case Concludes with Guilty Plea in UK
Zhimin Qian, involved in a £5.5 billion Bitcoin fraud, pleaded guilty in a UK court, marking the end of a seven-year investigation by London's Metropolitan Police. The investigation, initiated in 2018, uncovered Qian's illegal entry into the UK and subsequent laundering of fraud proceeds through property investments overseas. Qian's large-scale fraud in China affected over 128,000 individuals, netting 61,000 Bitcoin, valued at approximately $7.4 billion today. Her accomplice, Jian Wen, was previously jailed for her role in laundering, including purchasing properties in Dubai and handling a crypto wallet linked to the fraud. Wen was sentenced to six years and eight months, with an additional penalty to repay £3.1 million or face extended imprisonment. The successful conviction involved collaboration with the National Crime Agency, Crown Prosecution Service, and Chinese law enforcement. This case demonstrates the complexities of international fraud investigations and the importance of cross-border cooperation in tackling cybercrime.
Details
2025-09-30 09:24:17 thehackernews MALWARE New Android Trojan "Datzbro" Targets Elderly with AI-Generated Scams
ThreatFabric identified a new Android banking trojan, Datzbro, exploiting seniors via AI-generated Facebook travel events, with initial reports from Australia and further targeting in Singapore, Malaysia, Canada, South Africa, and the U.K. The campaign lures elderly users into downloading malicious APK files under the guise of community apps, facilitating device takeover and financial fraud through remote control and keylogging. Datzbro's capabilities include recording audio, capturing photos, accessing files, and stealing credentials, leveraging Android's accessibility services to perform unauthorized actions discreetly. The malware features a unique remote control mode, allowing operators to replicate the device's screen layout, enhancing their ability to commandeer the victim's device. Evidence suggests a Chinese-speaking threat group is behind Datzbro, based on Chinese debug strings in the code and a Chinese-language C2 backend application. The campaign underscores the evolving threat landscape, where social engineering and community-driven activities are used to exploit trust and execute financial fraud. The discovery of Datzbro coincides with IBM X-Force's findings on PhantomCall, another Android banking malware targeting global financial institutions, indicating a broader trend of sophisticated mobile threats.
Details
2025-09-30 08:35:45 thehackernews VULNERABILITIES Securing AI Supply Chains: New Paradigms for Enterprise Defense
The rapid adoption of AI in enterprises introduces new vulnerabilities, particularly within the supply chain, necessitating a shift in security strategies. Traditional security measures fall short in addressing the speed and complexity of AI-driven environments, leaving organizations exposed to potential risks. Wing Security offers a comprehensive solution by extending its SaaS Security Posture Management to tackle AI-specific threats through continuous discovery and real-time monitoring. The platform identifies all AI applications in use, including unsanctioned tools, ensuring visibility and control over the enterprise's AI landscape. Advanced analytics provide insights into vendor security practices, potential data exposure, and third-party dependencies that may expand the attack surface. Adaptive risk assessments and governance controls are applied to maintain safe and compliant AI usage, reducing the risk of breaches and regulatory issues. By transforming security into a business enabler, Wing Security allows organizations to harness AI's potential without compromising safety or compliance.
Details
2025-09-30 08:25:13 thehackernews CYBERCRIME U.K. Police Seize £5.5 Billion in Historic Bitcoin Bust
U.K. authorities confiscated £5.5 billion in Bitcoin linked to a fraudulent cryptocurrency scheme, marking the largest crypto seizure globally. Zhimin Qian, a Chinese national, pleaded guilty to charges related to the acquisition of criminal property, following a 2018 investigation. The scheme defrauded over 128,000 victims in China from 2014 to 2017, promising false investment returns and converting proceeds into Bitcoin. Qian fled China using false documents, attempting to launder funds through property purchases in the U.K. with an accomplice, Jian Wen. Jian Wen, involved in moving a cryptocurrency wallet with 150 Bitcoin, was sentenced to over six years and ordered to repay £3.1 million. The operation underscores the growing challenge of cryptocurrency-related fraud and the need for robust international law enforcement collaboration. Authorities emphasize the importance of vigilance and regulatory measures in combating digital financial crimes and protecting potential victims.
Details
2025-09-30 07:52:50 theregister MISCELLANEOUS EU Cyber Resilience Act Eases Concerns for Open Source Developers
The EU's Cyber Resilience Act (CRA) initially raised concerns among open source developers about potential liabilities and compliance burdens. Greg Kroah-Hartman, a Linux kernel maintainer, reassures that the CRA will have minimal impact on individual open source contributors. The CRA mandates companies to document and secure their software supply chains, including generating a Software Bill of Materials (SBOM). Non-commercial open source developers face minimal requirements, such as providing a security contact in a basic "readme" file. Commercial entities integrating open source code must comply with detailed documentation and incident response requirements. The CRA's scope extends globally, affecting any software accessible in the EU market, impacting U.S. and Japanese vendors. The Act is expected to increase demand for open source software as companies seek greater control over code compared to proprietary options. Foundations and large projects are collaborating with the EU to develop compliance resources, ensuring clarity between commercial and non-commercial obligations.
Details
2025-09-30 05:44:38 thehackernews VULNERABILITIES CISA Warns of Critical Sudo Vulnerability Exploited in Linux Systems
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a critical vulnerability in the Sudo utility, impacting Linux and Unix systems, now listed in the Known Exploited Vulnerabilities catalog. The flaw, CVE-2025-32463, carries a CVSS score of 9.3 and affects Sudo versions before 1.9.17p1, posing significant security risks. Discovered by Stratascale's Rich Mirch, the vulnerability allows local attackers to execute arbitrary commands as root, bypassing sudoers file restrictions. CISA advises Federal Civilian Executive Branch agencies to implement mitigations by October 20, 2025, to protect their systems from potential exploitation. While active exploitation is confirmed, details on attack methods and responsible parties remain unclear, necessitating heightened vigilance. This incident underscores the critical need for timely patching and system updates to mitigate vulnerabilities in widely used software components. Organizations using affected systems should prioritize patch deployment and review security protocols to prevent unauthorized access.
Details