Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12589
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2026-02-04 14:21:28 | bleepingcomputer | MALWARE | EDR Killer Exploits Revoked Driver to Disable Security Tools | Cybercriminals are leveraging a revoked EnCase kernel driver in a new EDR killer tool designed to disable endpoint detection and response systems.
The attackers used a BYOVD technique, introducing a legitimate but vulnerable driver to gain kernel-level access and terminate security software processes.
The attack involved compromised SonicWall SSL VPN credentials and exploited the absence of multi-factor authentication for VPN access, facilitating network infiltration.
The malicious tool disguises itself as a firmware update utility, using the EnPortv.sys driver to disable 59 different security processes on the host system.
Despite Microsoft's defenses, Windows systems remain susceptible due to exceptions allowing older certificates, which the attackers exploited for persistence.
Huntress researchers suggest enabling MFA, monitoring VPN logs, and deploying WDAC and ASR rules to block vulnerable drivers as preventive measures.
The intrusion was linked to potential ransomware activity, though the attack was halted before the ransomware could be deployed. | Details |
| 2026-02-04 14:12:13 | thehackernews | NATION STATE ACTIVITY | Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia Espionage | China-linked Amaranth-Dragon group targets Southeast Asian governments with espionage campaigns, leveraging a WinRAR vulnerability for code execution.
Check Point Research attributes these activities to the APT41 ecosystem, with operations coinciding with political and security events in the region.
The campaigns employ spear-phishing emails to distribute malicious RAR files, exploiting CVE-2025-8088 for persistent access.
Attackers use DLL side-loading techniques, deploying Amaranth Loader to retrieve and execute encrypted payloads in memory.
The campaigns demonstrate advanced operational security by restricting C2 communication to specific regional IP addresses.
Amaranth-Dragon's tactics include using trusted cloud platforms like Dropbox to bypass traditional defenses, indicating high technical proficiency.
The group's activities highlight the ongoing threat posed by nation-state actors using sophisticated techniques for geopolitical intelligence gathering. | Details |
| 2026-02-04 14:02:58 | bleepingcomputer | NATION STATE ACTIVITY | Amaranth Dragon Exploits WinRAR Flaw in Espionage Campaigns | Amaranth Dragon, linked to Chinese APT41, exploited a WinRAR vulnerability in espionage operations targeting government and law enforcement agencies across Southeast Asia.
The group utilized the CVE-2025-8088 flaw to write malicious files to arbitrary locations, leveraging Windows' Alternate Data Streams feature for persistence.
Researchers identified Amaranth Dragon's use of legitimate tools combined with a custom loader to deploy encrypted payloads from C2 servers, enhancing stealth and targeting precision.
Attacks were geographically restricted, using geopolitical or local event themes as lures, and employed ZIP archives with scripts to activate the loader.
A new remote access tool, TGAmaranth RAT, was observed, featuring capabilities like file transfer, process listing, and evasion techniques against antivirus and EDR solutions.
Multiple threat actors, including RomCom and Turla, have also exploited CVE-2025-8088, prompting advisories to upgrade to WinRAR version 7.13 or later.
Check Point's report provides indicators of compromise and YARA rules to aid in detecting Amaranth Dragon intrusions, showcasing the group's adaptability and technical skill. | Details |
| 2026-02-04 13:54:32 | theregister | RANSOMWARE | Nitrogen Ransomware's Fatal Flaw Leaves Victims Without Recovery | Nitrogen ransomware's flawed code prevents data recovery, affecting victims who cannot retrieve encrypted files even if they pay the ransom.
Coveware's analysis reveals a programming error in Nitrogen's ransomware targeting VMware ESXi, making decryption impossible due to a corrupted public key.
The ransomware mistakenly overwrites part of the public key with a QWORD, rendering the decryption process ineffective and leaving victims with unrecoverable data.
Nitrogen emerged in 2023, evolving from code borrowed from the leaked Conti 2 builder, and began extorting organizations by September 2024.
Despite not being a leading ransomware group, Nitrogen's actions highlight the destructive potential of poorly executed ransomware operations.
The incident serves as a stark reminder of the importance of robust data backup strategies and cybersecurity defenses to mitigate ransomware risks. | Details |
| 2026-02-04 11:59:57 | thehackernews | MISCELLANEOUS | Orchid Security Enhances Identity Management with Continuous Observability | Orchid Security introduces a platform offering continuous identity observability, addressing gaps in traditional identity and access management (IAM) systems.
Modern enterprises face challenges as identity logic shifts into application code, APIs, and custom authentication, creating blind spots termed as "Identity Dark Matter."
The platform operates through a four-stage model: discovery, analysis, orchestration, and auditing, providing a comprehensive view of identity usage.
Lightweight instrumentation enables the discovery of authentication methods and credential usage across both managed and unmanaged environments.
By analyzing observed behavior, Orchid identifies and surfaces active identity risks, allowing teams to focus on real-time threats.
Orchid integrates with existing IAM and security workflows, enhancing remediation efforts without replacing current controls.
Continuous auditing ensures security and GRC teams have ongoing access to evidence, streamlining compliance and reducing manual efforts.
This approach empowers organizations to make informed decisions based on verified identity data, aligning with the operational realities of modern enterprises. | Details |
| 2026-02-04 11:59:57 | bleepingcomputer | CYBERCRIME | Operator of Incognito Dark Web Drug Market Sentenced to 30 Years | Rui-Siang Lin, a Taiwanese national, received a 30-year prison sentence for running Incognito Market, a major online narcotics marketplace responsible for over $105 million in illegal drug sales.
The U.S. District Court described the operation as one of the most serious drug crimes encountered, with Lin labeled as a digital-era drug kingpin.
Incognito Market facilitated over 640,000 transactions, involving more than one ton of narcotics, including methamphetamine, cocaine, amphetamine, and ecstasy, some laced with fentanyl.
Lin's operation involved 1,800 vendors and over 400,000 customer accounts, with transactions conducted via cryptocurrency through a platform called "Incognito Bank."
Law enforcement accessed servers hosting the marketplace to gather evidence, leading to Lin's arrest and subsequent guilty plea to multiple charges, including money laundering and drug distribution.
Lin's activities contributed to the opioid crisis, with his offenses linked to at least one death and widespread harm to over 470,000 narcotics users globally.
The case underscores ongoing law enforcement efforts to dismantle dark web marketplaces, with recent convictions of other dark web operators reinforcing this trend. | Details |
| 2026-02-04 11:43:39 | theregister | DATA BREACH | PSNI Offers Compensation Following Major 2023 Data Breach | The Police Service of Northern Ireland (PSNI) announced a £7,500 compensation for each employee affected by a significant 2023 data breach, totaling £119 million in payouts.
The breach, one of the UK's most severe, involved the accidental online publication of a spreadsheet revealing personal details of PSNI officers, including names and addresses.
Officers faced heightened safety risks and mental health challenges, with some relocating or enhancing home security due to the exposure of sensitive information.
The compensation aims to provide closure for many affected, though some officers may pursue further legal action, feeling the offer insufficient for their circumstances.
The breach strained PSNI's mental health services, highlighting the need for robust support systems in the wake of cybersecurity incidents.
The incident underscores the critical importance of data handling protocols, especially in sensitive sectors, to prevent future breaches and ensure staff safety. | Details |
| 2026-02-04 10:08:41 | thehackernews | MISCELLANEOUS | Effective Incident Response Hinges on Early Decision-Making Discipline | The article emphasizes the critical nature of early decisions in incident response, impacting the overall success of cybersecurity investigations.
Initial moments post-detection are crucial; responders must establish direction to avoid assumptions that can hinder investigation progress.
Consistency in approach when addressing new systems is vital to managing growing intrusion scope without losing control.
Common failures include inadequate environment knowledge, ineffective evidence prioritization, and premature closure of investigations.
Effective incident response requires understanding execution evidence and maintaining discipline under uncertainty to prevent repetitive mistakes.
The SANS Institute offers training to enhance these skills, focusing on advanced incident response, threat hunting, and digital forensics.
Teams prepared with a disciplined approach can transform challenging investigations into manageable tasks, reducing stress and improving outcomes. | Details |
| 2026-02-04 07:46:46 | thehackernews | MALWARE | Microsoft Alerts on Python Infostealers Targeting macOS via Fake Ads | Microsoft's Defender Security Research Team reports a surge in macOS-targeted infostealer campaigns using Python, expanding beyond traditional Windows environments.
Attackers employ social engineering tactics, such as ClickFix, to distribute DMG installers that deploy malware like Atomic macOS Stealer and MacSync.
Malicious ads redirect users searching for AI tools to fake sites, tricking them into downloading malware that steals credentials and sensitive data.
Campaigns utilize fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft, including iCloud Keychain and developer secrets.
PXA Stealer, linked to Vietnamese-speaking actors, uses phishing emails and Telegram for command-and-control, targeting login credentials and financial information.
Organizations are advised to educate users on malvertising, monitor suspicious Terminal activity, and inspect network egress for unusual domain requests.
Infostealers pose risks of data breaches, unauthorized access, and potential ransomware attacks, necessitating heightened vigilance and user awareness. | Details |
| 2026-02-04 06:28:31 | thehackernews | VULNERABILITIES | Eclipse Foundation Implements Pre-Publish Security Checks for VS Code Extensions | The Eclipse Foundation will enforce security checks before publishing Microsoft Visual Studio Code extensions on the Open VSX Registry to combat supply chain threats.
This proactive measure shifts from a post-publication response to a pre-publication vetting process, aiming to prevent malicious extensions from being published.
Open-source registries face increased attacks, with methods like namespace impersonation and typosquatting targeting developers at scale.
Recent incidents, such as a compromised publisher account pushing poisoned updates, highlight the need for enhanced security measures.
The new verification program will be rolled out in stages, with February 2026 dedicated to monitoring and fine-tuning the system to reduce false positives.
Microsoft employs a similar multi-step vetting process for its Visual Studio Marketplace, including malware scans and periodic rescans.
The initiative aims to raise the security baseline, helping publishers identify issues early and ensuring a fair and predictable experience. | Details |
| 2026-02-04 05:55:30 | thehackernews | VULNERABILITIES | CISA Flags Critical SolarWinds Web Help Desk Flaw for Urgent Fixes | The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical SolarWinds Web Help Desk vulnerability to its Known Exploited Vulnerabilities catalog, indicating active exploitation.
Tracked as CVE-2025-40551, this flaw involves untrusted data deserialization, potentially allowing remote code execution with a CVSS score of 9.8.
SolarWinds has issued patches for this and several other vulnerabilities in WHD version 2026.1, addressing critical security concerns.
Federal agencies must remediate CVE-2025-40551 by February 6, 2026, under Binding Operational Directive 22-01, to mitigate significant risks.
While no public reports detail the exploitation methods or targets, the rapid exploitation of newly disclosed vulnerabilities remains a critical challenge.
The KEV catalog also includes vulnerabilities like CVE-2021-39935, previously noted for widespread abuse in various platforms, emphasizing the need for timely patching.
This situation underscores the importance of proactive vulnerability management and swift response to emerging threats in cybersecurity practices. | Details |
| 2026-02-04 05:29:41 | theregister | VULNERABILITIES | Gartner Warns Against Using OpenClaw AI Due to Security Risks | Gartner has issued a strong advisory against using OpenClaw, citing significant cybersecurity risks associated with the AI platform's insecure default settings.
OpenClaw allows users to automate tasks by providing credentials to various online services, posing risks such as plaintext credential storage and exposure to attackers.
Cloud providers like Tencent, DigitalOcean, and Alibaba have launched OpenClaw-as-a-service, making it accessible but potentially increasing the risk of insecure deployments.
Gartner's analysis points to the software's lack of enterprise-grade security features, including absent authentication enforcement and vendor support, making it unsuitable for corporate environments.
Businesses are advised to block OpenClaw downloads, halt traffic to the software, and instruct users to cease its use to mitigate potential security breaches.
For those who must use OpenClaw, Gartner recommends running it in isolated, nonproduction environments with disposable credentials to limit exposure.
Organizations should rotate any credentials used by OpenClaw to prevent unauthorized access due to its insecure handling of sensitive information. | Details |
| 2026-02-04 02:11:49 | bleepingcomputer | DATA BREACH | Coinbase Insider Breach Exposes Customer Data via Support Tool | Coinbase confirmed a contractor accessed sensitive data of approximately 30 customers in an insider breach discovered last December.
Impacted customers were promptly notified and offered identity theft protection services as part of the response strategy.
The breach involved unauthorized access to a support tool revealing customer data, including personal and financial details.
The incident was disclosed to regulators, following standard compliance protocols for data breaches.
The breach is distinct from a previous incident involving TaskUs, another BPO firm linked to Coinbase.
Business Process Outsourcing (BPO) firms remain a significant target for threat actors seeking access to sensitive corporate data.
Social engineering and bribery tactics are increasingly used to exploit BPO employees, highlighting the need for robust security training and protocols.
The trend of targeting outsourced support services emphasizes the importance of securing third-party access to corporate systems. | Details |
| 2026-02-03 23:59:18 | theregister | CYBERCRIME | AI Tools Enhance Cybercriminal Capabilities in Attack Chains | The International AI Safety report reveals AI systems are increasingly aiding cybercriminals, though fully autonomous attacks remain unrealized.
AI tools have been used in attacks on approximately 30 high-profile companies and government organizations, with some success.
AI excels in scanning for vulnerabilities and generating malicious code, significantly aiding criminals in these attack stages.
DARPA's AI Cyber Challenge demonstrated AI's potential in identifying vulnerabilities, with finalist systems detecting 77% of synthetic flaws.
Criminals leverage AI models like HexStrike to exploit vulnerabilities swiftly, as seen with Citrix NetScaler appliances.
AI-generated malware and ransomware models are available on underground forums, with some priced as low as $50 monthly.
Current AI limitations include difficulty executing complex, multi-stage attacks without human intervention, reducing immediate threat levels.
Future risks include potential for AI agents to act unpredictably, emphasizing the need for ongoing vigilance and preparedness. | Details |
| 2026-02-03 21:36:04 | bleepingcomputer | DATA BREACH | Step Finance Suffers $40 Million Crypto Theft from Executive Devices | Step Finance, a DeFi platform on Solana, reported a $40 million crypto asset loss due to compromised executive devices on January 31.
The breach involved multiple treasury wallets, exploiting a known attack vector during APAC hours, prompting immediate cybersecurity intervention.
Initial estimates by CertiK placed the loss at $28.9 million, but further investigation revised it to $40 million.
Recovery efforts have reclaimed $3.7 million in Remora assets and $1 million from other positions, aided by Token22 protections and partner collaboration.
Operations have been temporarily halted to strengthen security, with authorities notified and ongoing investigations into the breach.
Speculation about a potential "rug pull" or insider involvement remains unaddressed, raising concerns about internal security protocols.
The incident forms part of a broader trend, with $398 million lost to crypto thefts in January alone, highlighting persistent vulnerabilities in the sector. | Details |