Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 11785
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-09-10 13:10:29 | thehackernews | MALWARE | New CHILLYHELL and ZynorRAT Malware Threaten Multiple Operating Systems | Cybersecurity researchers identified two new malware threats: CHILLYHELL, a macOS backdoor, and ZynorRAT, a multi-platform RAT targeting Windows and Linux systems.
CHILLYHELL, developed for Intel architectures, is attributed to the threat cluster UNC4487, suspected of espionage activities against Ukrainian government entities.
The malware uses sophisticated persistence methods and communicates with command-and-control servers over HTTP or DNS, allowing it to execute a wide range of commands.
CHILLYHELL employs tactics like timestomping and password cracking, making it a unique threat in the macOS landscape; Apple has revoked its developer certificates.
ZynorRAT, written in Go, utilizes a Telegram bot for command-and-control, enabling file exfiltration, system enumeration, and arbitrary command execution on infected systems.
Evidence suggests ZynorRAT is the work of a lone actor, possibly of Turkish origin, with payloads distributed via Dosya.co, a file-sharing service.
The emergence of these malware families underscores the evolving sophistication and persistence of threats across multiple operating systems, emphasizing the need for robust security measures. | Details |
| 2025-09-10 11:38:11 | theregister | CYBERCRIME | Ukrainian Ransomware Leader Indicted for $18 Billion in Damages | Volodymyr Tymoshchuk, a Ukrainian national, faces federal charges for leading ransomware operations causing $18 billion in global damages, with an $11 million bounty for his capture.
The operations, including LockerGoga, MegaCortex, and Nefilim, targeted over 250 U.S. companies and hundreds more worldwide, severely disrupting business operations.
Norsk Hydro's 2019 ransomware attack, linked to Tymoshchuk, resulted in $81 million in damages, affecting 35,000 employees across 40 countries.
The U.S. Justice Department has charged Tymoshchuk with multiple counts of computer intrusion, extortion, and unauthorized access, with potential life imprisonment if convicted.
The ransomware groups exploited tools like Cobalt Strike and Metasploit, often using stolen credentials to infiltrate networks undetected for months.
Despite the indictment, Tymoshchuk remains at large, with international efforts underway to secure his arrest and extradition.
The case underscores the persistent threat of ransomware and the importance of proactive detection and notification to thwart attacks. | Details |
| 2025-09-10 11:23:01 | thehackernews | VULNERABILITIES | Microsoft Releases Patches for 80 Security Flaws in October Update | Microsoft addressed 80 security vulnerabilities, including eight critical ones, in its latest software update, with no zero-day exploits reported.
The October update includes 38 privilege escalation flaws, 22 remote code execution vulnerabilities, and other issues affecting Microsoft's software suite.
A significant flaw, CVE-2025-55234, involves privilege escalation in Windows SMB, potentially enabling relay attacks if proper authentication measures aren't implemented.
Azure Networking's CVE-2025-54914 received the highest CVSS score of 10.0, but requires no customer action due to its cloud-specific nature.
The update also rectifies vulnerabilities in Microsoft Edge, Windows NTLM, and BitLocker, addressing potential risks of unauthorized access and data exfiltration.
Organizations are encouraged to implement additional security measures, such as SMB signing and TPM+PIN for BitLocker, to mitigate potential threats.
The disclosure of BitLockMove, a new lateral movement technique, underscores the need for robust security practices to prevent domain escalation risks. | Details |
| 2025-09-10 10:25:40 | thehackernews | VULNERABILITIES | Apple Introduces Memory Integrity Enforcement for Enhanced iPhone Security | Apple has unveiled Memory Integrity Enforcement (MIE) with the new iPhone 17 and iPhone Air, enhancing memory safety against spyware without compromising performance.
MIE is integrated into Apple's A19 and A19 Pro chips, focusing on critical attack surfaces like the kernel and over 70 userland processes.
The technology is based on Enhanced Memory Tagging Extension (EMTE), improving on Arm's 2019 Memory Tagging Extension to prevent memory corruption.
MIE addresses buffer overflow and use-after-free vulnerabilities, blocking unauthorized memory access and retagging memory to prevent exploitation.
Apple's Tag Confidentiality Enforcement (TCE) secures memory allocators against side-channel and speculative execution attacks, enhancing protection against known vulnerabilities.
This advancement positions Apple alongside Google and Microsoft, which have also integrated similar memory safety features in their devices and operating systems.
The introduction of MIE signifies a significant step in device security, potentially reducing the effectiveness of zero-day exploits. | Details |
| 2025-09-10 10:18:51 | theregister | DATA BREACH | Birmingham School Data Breach Exposes Students' Personal Information | A Birmingham secondary school inadvertently exposed personal data of students in Years 7 to 11, affecting hundreds of families.
The breach involved a spreadsheet containing student names, genders, dates of birth, and parents' contact details, shared via email.
The data was accessible through the school's intranet for nine minutes, potentially downloaded by parents who received the email.
Immediate actions included contacting the management information system provider to remove and recall the message, and advising parents to delete the information.
The school has apologized and is working with the Trust Data Protection Officer to investigate and prevent future incidents.
Parents expressed concerns over potential risks to their children's safety due to the exposure of sensitive information.
The school is cooperating with the Information Commissioner's Office (ICO) as part of the ongoing investigation. | Details |
| 2025-09-10 09:55:58 | thehackernews | NATION STATE ACTIVITY | APT41 Cyber Espionage Targets U.S. Trade Officials Amid Negotiations | The House Select Committee on China issued a warning about cyber espionage campaigns linked to the People's Republic of China targeting U.S. trade policy stakeholders.
APT41, a group associated with China, impersonated U.S. Congressman John Robert Moolenaar in phishing emails to deceive and gain unauthorized access to sensitive information.
The attacks aimed to steal data by exploiting software and cloud services, a common tactic among state-sponsored hackers to avoid detection.
The phishing campaign targeted U.S. government agencies, business organizations, law firms, think tanks, and a foreign government involved in U.S.-China trade talks.
The attackers used sophisticated methods, including malware-laden attachments, to gather sensitive data and establish persistent access to targeted systems.
The campaign is part of a broader effort by China to influence U.S. policy and negotiation strategies, leveraging cyber operations to gain strategic advantage.
The Chinese embassy in Washington refuted the allegations, emphasizing their opposition to cyber attacks and the importance of evidence-based accusations. | Details |
| 2025-09-10 09:33:29 | thehackernews | MISCELLANEOUS | Automation Transforms Cybersecurity Services for Managed Providers | Managed service providers face increasing pressure to deliver robust cybersecurity amidst evolving threats and compliance demands, while clients seek better protection without direct management.
Many providers struggle with manual processes that hinder efficiency, delay client outcomes, and restrict growth, impacting both profitability and service quality.
Automation offers a solution by streamlining repetitive tasks, enhancing consistency, and freeing resources, enabling providers to expand services and strengthen client relationships.
AI-powered platforms like Cynomi's vCISO reduce cybersecurity workload significantly, cutting manual efforts by up to 70% and improving service delivery timelines.
The transition to automation can dramatically reduce task completion times, enhancing scalability and operational efficiency for service providers.
A practical guide outlines key areas for automation impact and provides a roadmap for integrating these technologies into cybersecurity operations.
Embracing automation positions providers to scale effectively, serve more clients, and transition from technical support roles to trusted business advisors. | Details |
| 2025-09-10 08:03:55 | theregister | CYBERCRIME | Cyberattack Disrupts Jaguar Land Rover's Global Operations | Jaguar Land Rover experienced a major cyberattack, leading to IT system disruptions across multiple sites, affecting production and dealer operations globally.
The attack, occurring on August 31, forced shutdowns at the Solihull plant, halting vehicle registration and parts supply in the UK.
A group named "Scattered Lapsus$ Hunters," possibly comprising teenagers, claimed responsibility, sharing internal system screenshots on Telegram.
JLR's rapid response involved shutting down IT systems to prevent further lateral movement by attackers, minimizing potential damage.
The incident underscores the vulnerability of the manufacturing sector to cyber threats, similar to recent breaches affecting Clorox and Microsoft.
Lessons for businesses include the need for swift response protocols, diversifying tech stacks, securing identity systems, and adopting a Zero Trust model.
The attack emphasizes the importance of pre-authorized decision-making at the board level for rapid isolation and containment during cyber incidents. | Details |
| 2025-09-10 08:03:54 | thehackernews | CYBERCRIME | Salty2FA Phishing Kit Threatens US and EU Enterprises' Security | Researchers at ANY.RUN have identified Salty2FA, a new phishing kit targeting US and EU enterprises, capable of bypassing multiple two-factor authentication methods.
Salty2FA poses a significant threat to industries such as finance, energy, and telecommunications by facilitating account takeovers through credential theft.
The phishing kit employs a multi-stage execution chain, including convincing email lures and fake login pages, to intercept credentials and 2FA codes.
Campaigns using Salty2FA have been active since late July 2025, with early traces potentially dating back to March, impacting numerous enterprises across regions.
Security Operations Centers (SOCs) are advised to focus on behavioral patterns and response speed, as static indicators like domains or hashes change frequently.
Interactive sandboxing tools, such as ANY.RUN, are recommended to enhance threat visibility and reduce investigation times, providing critical insights into evolving phishing tactics.
Enterprises are encouraged to adopt these advanced defenses to transform Salty2FA from a hidden risk into a manageable threat, ensuring robust protection against phishing attacks. | Details |
| 2025-09-10 03:34:00 | theregister | VULNERABILITIES | SAP and Microsoft Patch Critical Flaws in September Updates | SAP's latest update addresses four critical vulnerabilities in NetWeaver, including a deserialization flaw (CVE-2025-42944) with a perfect 10 CVSS score, requiring immediate attention from users.
Microsoft’s Patch Tuesday brought eight critical fixes, notably CVE-2025-55232, which poses a risk of remote code execution in High Performance Compute environments, urging admins to monitor TCP port 5999.
Microsoft also released patches for Excel, Defender Firewall, and Hyper-V, addressing elevation of privilege and other critical security issues.
Adobe issued 22 patches, with a priority fix for a file system overwriting bug in ColdFusion and critical updates for Adobe Commerce, Magento, and Acrobat.
Android released its largest patch bundle of the year with 120 fixes, including two actively exploited vulnerabilities, highlighting the need for prompt updates by OEMs.
Cisco addressed a high-severity denial-of-service vulnerability in its Secure Firewall ASA software, emphasizing the importance of rapid deployment of security patches.
Organizations are advised to prioritize these updates to mitigate potential exploitation and maintain system integrity across diverse platforms. | Details |
| 2025-09-10 01:11:43 | thehackernews | VULNERABILITIES | Critical Adobe Commerce Flaw CVE-2025-54236 Threatens Customer Accounts | Adobe has identified a critical security flaw, CVE-2025-54236, in its Commerce and Magento Open Source platforms, potentially allowing attackers to control customer accounts.
The vulnerability, named SessionReaper, scores 9.1 on the CVSS scale and involves improper input validation via the Commerce REST API.
Adobe has issued a hotfix and implemented web application firewall rules to protect against potential exploitation attempts targeting its cloud infrastructure.
E-commerce security firm Sansec notes SessionReaper's severity, comparing it to past significant Magento vulnerabilities like Shoplift and TrojanOrder.
The flaw involves a malicious session and a nested deserialization bug, with multiple exploitation paths, including a remote code execution vector requiring file-based session storage.
Merchants using Redis or database sessions are advised to take immediate action, as various avenues exist to exploit this vulnerability.
Adobe has also addressed a critical path traversal vulnerability in ColdFusion, CVE-2025-54261, which could lead to arbitrary file system writes, affecting multiple versions across platforms. | Details |
| 2025-09-10 01:05:03 | thehackernews | VULNERABILITIES | SAP Releases Critical Patches for NetWeaver and S/4HANA Flaws | SAP issued security updates addressing critical vulnerabilities in NetWeaver, with a CVSS score up to 10.0, posing risks of code execution and arbitrary file uploads.
An unauthenticated attacker could exploit CVE-2025-42944 to execute arbitrary OS commands, potentially compromising the entire application.
As a temporary measure, SAP recommends adding P4 port filtering at the ICM level to block unauthorized access.
A high-severity bug in SAP S/4HANA (CVE-2025-42916) could allow high-privilege users to delete database table contents without proper authorization.
Recent disclosures revealed active exploitation of another critical S/4HANA flaw (CVE-2025-42957), emphasizing the need for timely patch application.
Organizations are urged to apply the latest patches promptly to safeguard against potential exploitation and maintain system integrity. | Details |
| 2025-09-09 21:46:59 | theregister | VULNERABILITIES | Recent npm Supply Chain Attack Exposes Ecosystem Fragility | A recent supply chain attack compromised npm packages, affecting approximately 10% of cloud environments, with malware-laden versions available for two hours.
Attackers exploited a phishing email to reset two-factor authentication on a developer's account, injecting cryptocurrency-stealing malware into popular packages.
Despite the potential for significant financial impact, attackers only managed to steal $925 in cryptocurrency, highlighting operational missteps.
The attack primarily resulted in a denial-of-service effect, consuming significant time and resources as organizations worked to mitigate risks.
The incident underscores the vulnerability of the JavaScript ecosystem, where many packages rely on utilities maintained by single developers.
Security experts advise vigilance against phishing and credential theft, which remain prevalent methods for compromising trusted infrastructure.
Organizations are urged to review their software supply chain security practices to prevent similar incidents in the future. | Details |
| 2025-09-09 20:28:29 | bleepingcomputer | CYBERCRIME | U.S. Sanctions Southeast Asian Cyber Scam Networks Exploiting Americans | The U.S. Department of the Treasury sanctioned cyber scam networks in Southeast Asia, responsible for defrauding Americans of over $10 billion in 2024.
These operations, based in Burma and Cambodia, employ forced labor and human trafficking, operating as modern slavery farms for online fraud.
The scams include romance baiting and fake cryptocurrency investments, with a 66% increase in financial damage reported compared to 2023.
Sanctions target nine entities linked to the Karen National Army in Burma and ten linked to organized crime networks in Cambodia.
The sanctions, based on multiple Executive Orders, block these entities from the U.S. financial system and freeze any U.S.-held assets.
While no arrests have been made, the sanctions aim to isolate these groups financially and legally, limiting their global operational capabilities. | Details |
| 2025-09-09 20:12:46 | theregister | VULNERABILITIES | DoD Finalizes Cybersecurity Certification Rule for Contractors | The Defense Department has finalized a rule mandating contractor compliance with the Cybersecurity Maturity Model Certification (CMMC) program, effective November 9. This move aims to enhance cybersecurity across the defense industrial base.
Contractors must meet one of three CMMC levels based on the sensitivity of unclassified data they handle. Compliance is required for contract eligibility with the DoD.
CMMC Level 1 requires an annual self-assessment, Level 2 typically demands a third-party audit, and Level 3 necessitates a government-led assessment, ensuring rigorous cybersecurity standards.
Requirements include controlling access to sensitive data, user authentication, physical security measures, regular software updates, and prompt incident reporting and remediation.
The rule places responsibility on both contractors and DoD contracting officers, who must specify CMMC levels in solicitations and verify vendor compliance before awarding contracts.
The finalized rule follows contractor feedback and revisions to the CMMC, addressing industry concerns while maintaining robust cybersecurity requirements.
Acting DoD CIO Katherine Arrington emphasized the importance of prioritizing U.S. national security through compliance with these cyber standards. | Details |