Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12634
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-11-22 15:19:51 | bleepingcomputer | DATA BREACH | Cox Enterprises Faces Data Breach via Oracle Zero-Day Exploit | Cox Enterprises disclosed a data breach affecting personal data after cybercriminals exploited a zero-day vulnerability in Oracle's E-Business Suite in August 2025.
The breach was not detected until late September, prompting an internal investigation and notification to affected individuals.
Cl0p ransomware group claimed responsibility, leveraging CVE-2025-61882 before Oracle released a patch on October 5, 2025.
The breach impacted various sectors, with companies like Logitech and Harvard University also affected by similar Oracle E-Business Suite vulnerabilities.
Cox Enterprises is offering 12 months of free identity theft protection and credit monitoring services to 9,479 impacted individuals.
The incident adds to Cox's history of breaches, including a 2024 attack on Cox Communications and a 2021 ransomware incident at Cox Media Group.
Cl0p continues to target high-profile organizations, recently listing 29 new companies as victims, signaling ongoing risks from zero-day exploits. | Details |
| 2025-11-22 13:49:26 | bleepingcomputer | CYBERCRIME | Huntress Labs Analyzes Qilin Ransomware Incident with Limited Visibility | Huntress Labs investigated a Qilin ransomware attack where the agent was installed post-incident, limiting initial visibility to a single endpoint.
The incident involved the installation of rogue software, including ScreenConnect, used to transfer malicious files to the compromised endpoint.
Analysts utilized Windows Event Logs and other data sources to piece together the attack timeline and identify attempted actions by the threat actor.
The threat actor disabled Windows Defender, attempting to execute infostealer malware, which ultimately failed due to system defenses.
The investigation revealed the use of ransomware-as-a-service (RaaS) tactics, with the threat actor leveraging Remote Desktop Protocol (RDP) for access.
Despite initial data limitations, the use of multiple data sources enabled a comprehensive understanding of the attack and informed remediation efforts.
The case emphasizes the importance of deploying security tools pre-incident and utilizing diverse data sources for accurate threat analysis and response. | Details |
| 2025-11-22 06:48:13 | thehackernews | VULNERABILITIES | CISA Alerts on Critical Oracle Identity Manager Zero-Day Exploitation | CISA has added a critical Oracle Identity Manager vulnerability, CVE-2025-61757, to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
The flaw allows unauthenticated remote code execution, impacting versions 12.2.1.4.0 and 14.1.2.1.0, with a CVSS score of 9.8, indicating severe risk.
Researchers identified the vulnerability as a bypass of a security filter, allowing attackers to manipulate authentication flows and escalate privileges.
Exploitation involves tricking protected endpoints into public access by appending "?WSDL" or ";.wadl" to URIs, exploiting a flawed allow-list mechanism.
The vulnerability was addressed in Oracle's recent quarterly updates, yet exploitation attempts were detected before the patch release, suggesting zero-day activity.
Federal agencies are mandated to apply the necessary patches by December 12, 2025, to mitigate potential threats to their networks.
Analysis of honeypot logs revealed multiple IP addresses scanning for the vulnerability, indicating coordinated attack efforts potentially from a single actor. | Details |
| 2025-11-22 06:48:12 | thehackernews | MALWARE | Matrix Push C2 Leverages Browser Notifications for Phishing Attacks | Cybercriminals are using Matrix Push C2, a new command-and-control platform, to execute phishing attacks through browser notifications across various operating systems.
The attack method involves social engineering tactics to trick users into permitting browser notifications, which are then used to distribute malicious links.
The platform operates as a malware-as-a-service (MaaS), available for purchase via crimeware channels, with subscriptions ranging from $150 to $1,500.
Matrix Push C2 enables attackers to impersonate well-known brands, using templates to craft convincing phishing messages and landing pages.
The service includes a web-based dashboard for tracking victim interactions, creating shortened URLs, and recording browser extensions, including cryptocurrency wallets.
This technique bypasses traditional security measures by operating entirely within the browser, posing a cross-platform threat.
The ultimate objective often involves data theft or financial gain, such as draining cryptocurrency wallets or exfiltrating personal information.
The emergence of Matrix Push C2 indicates a shift in initial access strategies, highlighting the evolving nature of cyber threats. | Details |
| 2025-11-21 23:57:21 | bleepingcomputer | VULNERABILITIES | CISA Warns of Active Exploitation of Oracle Identity Manager Flaw | The U.S. Cybersecurity & Infrastructure Security Agency (CISA) alerts agencies to patch Oracle Identity Manager vulnerability CVE-2025-61757, actively exploited since August 2025.
The flaw, identified as a pre-authentication remote code execution vulnerability, allows attackers to bypass Oracle Identity Manager's REST API security filters.
Exploitation involves appending parameters to URL paths, enabling unauthorized access to a Groovy script endpoint for malicious code execution.
Oracle addressed the vulnerability in its October 2025 security updates, released on October 21, urging immediate action to mitigate risks.
Searchlight Cyber's technical report provides detailed exploitation methods, raising concerns about the vulnerability's ease of use by threat actors.
CISA mandates Federal Civilian Executive Branch agencies to patch the flaw by December 12, citing significant risks to federal systems.
Evidence suggests the vulnerability was exploited as a zero-day, with multiple IP addresses scanning for the flaw before Oracle's patch release. | Details |
| 2025-11-21 19:29:35 | theregister | DATA BREACH | ShinyHunters Exploit OAuth Tokens to Breach Salesforce Integrations | ShinyHunters claimed responsibility for a breach affecting Gainsight and hundreds of Salesforce customers, exploiting OAuth tokens from a Salesloft GitHub account compromise.
The breach allowed unauthorized access to Salesforce customer data through compromised OAuth tokens, affecting integrations with third-party applications like Gainsight and Drift.
Salesforce swiftly revoked access and refresh tokens for Gainsight applications and temporarily removed them from the AppExchange to mitigate further unauthorized access.
Gainsight enlisted Google's Mandiant for incident response, emphasizing the breach originated from external application connections rather than Salesforce platform vulnerabilities.
Zendesk and HubSpot also took precautionary measures by revoking connector access and pulling Gainsight apps from their marketplaces during the investigation.
Google Threat Intelligence Group linked the breach to UNC6240, with over 200 Salesforce instances potentially affected, highlighting the widespread impact of the OAuth token compromise.
Salesforce maintained its stance against paying ransom demands, reinforcing its policy of not engaging with extortionists. | Details |
| 2025-11-21 18:00:18 | bleepingcomputer | VULNERABILITIES | Grafana Enterprise Vulnerability Allows Potential Admin Privilege Escalation | Grafana Labs identified a critical vulnerability (CVE-2025-41115) in its Enterprise product, enabling potential admin privilege escalation when SCIM provisioning is enabled.
The flaw is exploitable if both 'enableSCIM' and 'user_sync_enabled' options are true, allowing compromised SCIM clients to provision users with admin rights.
Grafana's internal audit discovered the issue, and a security update was released within 24 hours, with no exploitation detected in Grafana Cloud services.
The vulnerability affects Grafana Enterprise versions 12.0.0 to 12.2.1, while Grafana OSS users remain unaffected. Grafana Cloud services have already been patched.
Administrators of self-managed installations are urged to apply the patches or disable SCIM to mitigate the risk of exploitation.
The vulnerability's discovery comes amid increased scanning activity for older flaws, suggesting potential preparatory actions for exploiting new vulnerabilities.
Grafana's swift response highlights the importance of proactive internal audits and timely patch management to safeguard against privilege escalation threats. | Details |
| 2025-11-21 16:52:33 | bleepingcomputer | CYBERCRIME | CrowdStrike Insider Leaks Screenshots to Cybercriminal Groups | CrowdStrike confirmed an insider leaked internal system screenshots to unknown threat actors, but no breach of their systems or customer data occurred.
The insider was identified and terminated following an internal investigation, with the case now in the hands of law enforcement.
Screenshots appeared on Telegram, linked to groups like ShinyHunters and Scattered Spider, now operating as "Scattered Lapsus$ Hunters."
These groups have a history of targeting major companies through voice phishing and extortion, impacting brands like Google, Cisco, and LVMH subsidiaries.
The cybercriminal collective claimed responsibility for a significant breach at Jaguar Land Rover, causing over £196 million in damages.
ShinyHunters and Scattered Spider are transitioning to a new ransomware platform, ShinySp1d3r, after using various other ransomware tools.
The incident underscores the ongoing threat of insider risks and the importance of robust internal security measures. | Details |
| 2025-11-21 16:03:34 | bleepingcomputer | NATION STATE ACTIVITY | FCC Reverses Telecom Cybersecurity Rules Amid State-Sponsored Threats | The FCC has rescinded a ruling mandating enhanced cybersecurity measures for U.S. telecom carriers, initially introduced after the Salt Typhoon cyberattacks linked to Chinese espionage.
Salt Typhoon targeted major telecom companies, potentially compromising sensitive communications, including government wiretapping systems, raising national security concerns.
The rollback follows telecom industry lobbying, with firms citing the previous framework as overly burdensome and operationally taxing.
FCC's decision has faced criticism, particularly from Commissioner Anna M. Gomez, who argues it weakens national cybersecurity defenses against ongoing state-sponsored threats.
Despite the rollback, telecom providers have committed to independently improving their cybersecurity measures to mitigate risks.
Senators Maria Cantwell and Gary Peters opposed the FCC's decision, urging the agency to maintain stringent cybersecurity safeguards to protect national interests.
The situation underscores the tension between regulatory measures and industry pressures in safeguarding critical national infrastructure from sophisticated cyber threats. | Details |
| 2025-11-21 15:41:36 | thehackernews | VULNERABILITIES | Grafana Releases Critical Patch for SCIM Vulnerability in Enterprise Versions | Grafana has issued patches to fix a critical vulnerability in its SCIM component, identified as CVE-2025-41115, which could lead to privilege escalation or user impersonation.
The flaw, scoring a maximum CVSS of 10.0, affects Grafana Enterprise versions 12.0.0 to 12.2.1 where SCIM provisioning is enabled and configured.
Exploitation occurs when a malicious SCIM client provisions a user with a numeric externalId, potentially overriding internal user IDs.
This vulnerability was discovered internally by Grafana on November 4, 2025, during routine audits and testing of their systems.
Grafana urges users to apply the released patches immediately to prevent exploitation, given the high severity and potential impact.
The issue stems from the SCIM externalId mapping directly to internal user IDs, which can lead to impersonation of critical accounts like Admin.
Organizations using affected versions should review their SCIM configurations and update to the patched versions to secure their environments. | Details |
| 2025-11-21 15:41:35 | bleepingcomputer | CYBERCRIME | UK Teens Plead Not Guilty in Transport for London Cyberattack | Two British teenagers, linked to the Scattered Spider group, have pleaded not guilty to charges related to a cyberattack on Transport for London (TfL) in August 2024.
The attack, which disrupted TfL's online services and internal systems, initially appeared to spare customer data but later confirmed exposure of personal information.
The breach resulted in millions of pounds in damage, impacting TfL's operations, including its ability to process refunds for affected customers.
The defendants face charges of computer misuse and fraud, with allegations of causing or risking serious damage to human welfare.
Beyond the TfL incident, one defendant is accused of conspiring to attack U.S. healthcare networks, while the other faces charges of withholding passwords from authorities.
The U.S. Department of Justice has charged one of the teenagers with conspiracy, money laundering, and wire fraud in connection with over 120 network breaches.
The Scattered Spider group has been linked to ransom payments exceeding $115 million, targeting critical infrastructure and major retailers in the UK and U.S.
The case highlights the growing threat from cybercriminals in English-speaking countries, as noted by the UK National Crime Agency. | Details |
| 2025-11-21 15:04:57 | bleepingcomputer | MALWARE | Avast Launches Free AI-Driven Scam Defense to Combat Rising Threats | Avast has introduced Scam Guardian, a free AI-powered tool integrated into its Avast Free Antivirus, aimed at enhancing scam protection globally.
Cybercriminals are increasingly using AI to create sophisticated scams, making it crucial for users to have advanced protective measures.
Scam Guardian Pro, an enhanced version, is available through Avast Premium Security, offering additional layers of protection against email scams.
The Q1/2025 Gen Threat Report indicates a 186% surge in breached records, exposing sensitive personal information to potential exploitation.
Phishing scams have increased by 466% in the first quarter of 2025, now constituting nearly a third of all scam reports.
Scam Guardian uses AI trained on Gen Threat Labs data to detect malicious URLs and analyze context and language for deceptive intent.
The tool also identifies hidden threats in website code, neutralizing them to ensure safer online browsing and shopping experiences. | Details |
| 2025-11-21 14:04:09 | theregister | CYBERCRIME | U.S. Charges Four in Nvidia AI Chip Smuggling Scheme to China | U.S. authorities have charged four individuals for allegedly smuggling restricted Nvidia AI chips into China, bypassing export controls through shell companies and falsified documentation.
The defendants, based in Florida, Alabama, and California, are accused of using front companies and covert routes via Malaysia and Thailand to export the GPUs.
The operation reportedly involved at least four export attempts, with two successful shipments moving 400 Nvidia A100 GPUs to China between October 2024 and January 2025.
Law enforcement disrupted two further attempts, including a shipment of ten HPE supercomputers and 50 Nvidia H200 GPUs, preventing additional unauthorized exports.
The defendants allegedly received over $3.89 million in wire transfers from China to finance the illegal exports, without obtaining the necessary export licenses.
The Department of Justice aims to dismantle black-market channels for advanced U.S. AI technology, emphasizing accountability for those involved in such illicit trade.
This case is part of a broader initiative to enforce export controls, following revelations of significant unauthorized transfers of Nvidia technology to China.
The defendants face multiple charges, including conspiracy and export-control violations, with potential sentences of up to 20 years in prison if convicted. | Details |
| 2025-11-21 13:19:01 | theregister | CYBERCRIME | UK Crime Agency Disrupts Russian-Linked Cyber Laundering Network | The UK's National Crime Agency (NCA) dismantled a Russian-linked network using a Kyrgyzstan bank to launder cybercrime profits and support Moscow's war economy.
Operation Destabilise traced illicit cash flows through 28 UK towns, converting proceeds from drugs and firearms into cryptocurrency for cross-border transfers.
The network acquired a controlling stake in Keremet Bank, facilitating payments for Promsvyazbank, a Russian state-owned lender tied to military financing.
Key figures in the laundering operation, including leaders of the Smart and TGR networks, have been sanctioned by the US Treasury and face legal actions.
Intelligence led to the seizure of over $24 million overseas and £25 million in the UK, disrupting the network's financial operations significantly.
The NCA's crackdown has increased laundering costs in London, with over 120 arrests and enhanced international cooperation from agencies like the FBI and DEA.
The operation underscores the complex links between street-level crime, organized cybercriminals, and state-sponsored activities, posing ongoing challenges to global financial integrity. | Details |
| 2025-11-21 13:02:35 | thehackernews | VULNERABILITIES | Google Enhances Quick Share Security with Rust and AirDrop Compatibility | Google has updated Quick Share for Pixel 10 devices, enabling cross-platform file sharing with Apple's AirDrop, enhancing interoperability between Android and Apple devices.
The enhancement requires iPhone users to adjust discoverability settings for file transfers, while Android users must modify Quick Share visibility or be in Receive mode.
Quick Share's security is bolstered by Rust, a memory-safe programming language, reducing memory safety vulnerabilities and enhancing resilience against attacks.
An independent assessment by NetSPI confirmed the security of Google's implementation, noting it is stronger and does not leak information, unlike other manufacturers' versions.
A low-severity vulnerability was identified, allowing potential access to image thumbnails and SHA256 hashes, but Google has addressed this issue.
Google is piloting features in India to combat app-related financial fraud, including alerts for screen sharing during calls, enhancing user protection.
The company is also developing Enhanced Phone Number Verification (ePNV) to replace SMS OTP with SIM-based verification, aiming to improve sign-in security on Android devices. | Details |