Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11809

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-08-11 11:31:48 thehackernews MISCELLANEOUS Aligning Cybersecurity with Business Priorities for Enhanced Protection
Organizations are refining their security strategies to focus on business-critical assets, directly impacting revenue and operations, rather than just technical vulnerabilities. A structured four-step methodology has emerged, enabling organizations to align security efforts with business priorities, resulting in significant efficiency gains. Companies implementing this approach have reported up to a 96% reduction in remediation efforts, enhancing security posture where it is most impactful. Engagements with industry leaders highlight the growing role of CFOs in cybersecurity, emphasizing the need for framing security in terms of business risk management. The methodology fosters a common language between technical teams and business stakeholders, improving decision-making and communication. Security teams are encouraged to integrate business context into prioritization, focusing on assets that, if compromised, would disrupt core business functions. The approach shifts the focus from technical metrics to business outcomes, transforming security from a technical function into a strategic enabler.
Details
2025-08-11 11:24:03 theregister CYBERCRIME M&S Click & Collect Restored After Cyberattack Disruption
Marks and Spencer has reinstated its Click & Collect service following a significant cyberattack that disrupted operations in April, affecting online and in-store services. The attack initially forced M&S to take its internal processes offline, pausing online orders and limiting payment options, impacting customer experience and operational efficiency. Despite most services being restored, some functionalities like online stock checking and international orders remain unavailable, indicating ongoing recovery challenges. The financial impact of the attack is substantial, with M&S forecasting a £300 million loss in profits for the 2025/26 financial year, highlighting the severe economic implications of cyber incidents. The National Crime Agency arrested four individuals, including a minor, suspected of involvement in the attacks on M&S and other UK retailers, though no charges have been filed yet. The attacks are speculated to be linked to the Scattered Spider gang, known for social engineering tactics, underscoring the persistent threat posed by organized cybercriminal groups. Rival retailer Next reported increased sales, attributing part of its success to disruptions faced by competitors like M&S, illustrating competitive vulnerabilities in the retail sector.
Details
2025-08-11 09:41:23 bleepingcomputer VULNERABILITIES Over 29,000 Exchange Servers Exposed Due to Unpatched Vulnerability
Over 29,000 Microsoft Exchange servers remain unpatched against CVE-2025-53786, posing a significant risk of lateral movement and domain compromise in cloud environments. This high-severity flaw allows attackers to escalate privileges by manipulating trusted tokens or API calls, complicating detection efforts. Affected versions include Exchange Server 2016, 2019, and the Subscription Edition in hybrid configurations, with a hotfix released in April 2025. Despite no current evidence of exploitation, the vulnerability is tagged as "Exploitation More Likely," increasing its potential attractiveness to threat actors. The U.S. CISA issued Emergency Directive 25-02, mandating federal agencies to mitigate the vulnerability by updating and securing their Exchange environments. CISA strongly advises all organizations, regardless of sector, to follow federal mitigation steps to protect against potential attacks. The flaw's risks extend globally, with over 7,200 affected IP addresses in the U.S., 6,700 in Germany, and 2,500 in Russia.
Details
2025-08-11 09:02:05 theregister MISCELLANEOUS Adapting CVs for AI-Driven Recruitment in the Modern Job Market
The article examines the evolving landscape of job applications, focusing on optimizing CVs for AI-driven recruitment systems that are increasingly prevalent in today's job market. AI recruitment tools often prioritize keyword matching and pattern recognition, prompting candidates to tailor their CVs with specific industry-relevant terms and phrases. Applicants are advised to include comprehensive lists of skills, tools, and certifications to align with AI filters, which may not fully understand context or implied expertise. The article suggests using AI tools to generate multiple CV versions, enhancing the likelihood of passing initial AI screenings by matching specific job descriptions. It acknowledges the biases inherent in AI systems, which can reflect existing industry biases, but argues that AI is not necessarily worse than human recruiters. The piece stresses the importance of maintaining a balance between AI-optimized content and readability for human recruiters, ensuring the CV remains effective across different evaluation methods. The discussion includes potential pitfalls, such as AI hallucinations, where incorrect or exaggerated skills might be inadvertently included, necessitating careful review by the applicant.
Details
2025-08-11 08:22:18 bleepingcomputer DATA BREACH Connex Credit Union Data Breach Exposes 172,000 Members' Information
Connex Credit Union, a major Connecticut-based financial institution, experienced a data breach affecting 172,000 members, exposing personal and financial information. The breach occurred between June 2 and June 3, 2025, with unauthorized access to sensitive data, including Social Security numbers and account details. Despite the breach, Connex reports no evidence of unauthorized access to members' funds or accounts, but warns of potential phishing scams targeting its members. Connex has issued scam alerts on its website, advising members on how to identify fraudulent communications and urging them to report suspicious activity. The incident is part of a broader trend of data breaches, with groups like ShinyHunters and Scattered Spider targeting high-profile companies across various sectors. This breach underscores the critical need for robust cybersecurity measures and proactive member communication to mitigate the impact of such incidents.
Details
2025-08-11 05:55:52 thehackernews VULNERABILITIES WinRAR Zero-Day Exploitation Prompts Urgent Update to Version 7.13
WinRAR has released version 7.13 to patch a critical zero-day vulnerability, CVE-2025-8088, which allows path traversal and arbitrary code execution. The vulnerability affects Windows versions of WinRAR, RAR, UnRAR, and related components, potentially leading to files being written outside intended directories. ESET researchers discovered the flaw, which is actively exploited via malicious archives, with potential implications for sensitive file placement and code execution. Russian cybersecurity firm BI.ZONE indicates the hacking group Paper Werewolf may have exploited this vulnerability alongside CVE-2025-6218 in targeted attacks. Attacks reportedly targeted Russian organizations through phishing emails containing booby-trapped archives, leveraging the vulnerability for unauthorized code execution. The zero-day exploit was advertised on a Russian dark web forum for $80,000, suggesting a potential acquisition by threat actors for malicious campaigns. Users are advised to immediately update to WinRAR version 7.13 to mitigate risks associated with these vulnerabilities and protect against potential exploitation.
Details
2025-08-10 22:42:54 theregister VULNERABILITIES Trend Micro's Apex One Vulnerability Lacks Immediate Patch Solution
Trend Micro disclosed active exploitation of critical vulnerabilities in its Apex One endpoint security platform, affecting versions up to 14039, with no immediate patch available. The vulnerabilities, CVE-2025-54948 and CVE-2025-54987, allow remote attackers to execute commands on affected systems via the management console. A temporary mitigation is available, but it disables the Remote Install Agent function, impacting administrative operations. Organizations are advised to restrict access to management consoles to trusted administrators and avoid exposing them to the internet. A permanent patch is expected by mid-August, but businesses must implement interim security measures to protect their systems. This incident underscores the importance of securing management interfaces and applying access controls to mitigate potential threats.
Details
2025-08-10 19:34:16 thehackernews DDOS New Win-DDoS Flaws Exploit Public Domain Controllers for Botnets
Researchers from SafeBreach unveiled a novel DDoS attack method, Win-DDoS, leveraging public domain controllers (DCs) to form powerful botnets without needing code execution or credentials. The attack exploits a significant flaw in Windows LDAP client code, allowing attackers to manipulate URL referrals and overwhelm targeted servers. This method transforms DCs into DDoS bots, creating high-bandwidth attacks without requiring dedicated infrastructure, making detection challenging. Win-DDoS can cause LSASS crashes, reboots, or blue screens of death by exploiting unlimited referral list sizes, affecting business continuity. Three new DoS vulnerabilities were identified, enabling unauthenticated users to crash DCs, posing risks to both public and private infrastructure. The findings challenge enterprise threat models, indicating that internal systems are vulnerable to DoS attacks even without full compromise. Organizations are urged to reassess their defense strategies and resilience planning in light of these vulnerabilities to mitigate potential impacts.
Details
2025-08-10 14:17:09 bleepingcomputer VULNERABILITIES Google Patches Gemini Vulnerability Exploited via Calendar Invites
Google addressed a vulnerability in its Gemini assistant, exploited through Google Calendar invites to hijack user data without requiring direct user interaction. Attackers leveraged prompt injections embedded in calendar event titles to access sensitive information and control devices linked to Google services. The exploit allowed unauthorized access to Gmail content, Calendar information, and smart home controls, posing significant privacy risks. SafeBreach researchers demonstrated the attack, noting that existing protections in Gemini did not prevent the exploit. Google has implemented new safeguards and defenses to prevent such adversarial attacks in the future, enhancing user security. The incident underscores the importance of continuous security assessments and collaboration between researchers and tech companies to address emerging threats. Google’s proactive response and collaboration with researchers highlight the critical role of responsible disclosure in cybersecurity.
Details
2025-08-10 12:38:59 thehackernews VULNERABILITIES Researchers Reveal Windows RPC Vulnerability Enabling Domain Privilege Escalation
SafeBreach researchers disclosed a vulnerability in Windows RPC protocol, allowing attackers to impersonate legitimate servers through EPM poisoning, potentially escalating domain privileges. The flaw, identified as CVE-2025-49760, was patched by Microsoft in July 2025 during its regular Patch Tuesday updates. The vulnerability exploits the Windows Storage spoofing mechanism, enabling unauthorized attackers to manipulate core RPC components and perform network spoofing. Attackers can register interfaces of inactive services, tricking clients into connecting to malicious servers without administrative privileges. SafeBreach released the RPC-Racer tool to identify insecure RPC services and manipulate protected processes, highlighting the potential for adversary-in-the-middle and DoS attacks. Enhanced monitoring through RpcEpRegister calls and Event Tracing for Windows (ETW) is recommended to detect such attacks. The issue underscores the need for improved verification processes in the endpoint mapper to prevent unauthorized data acceptance and manipulation.
Details
2025-08-10 12:05:57 theregister NATION STATE ACTIVITY DEF CON Initiative Expands Cybersecurity Support for U.S. Water Systems
DEF CON's Franklin project is scaling up efforts to protect U.S. water systems from cyber threats, expanding from five to potentially thousands of utilities nationwide. Volunteers have been deployed to water facilities in Indiana, Oregon, Utah, and Vermont, providing crucial cybersecurity services like password management and multi-factor authentication. The initiative addresses vulnerabilities in small-town water systems, which are targets for nation-state actors like China and Iran due to their strategic importance. The project has gained significant interest, initially attracting 350 volunteers, and plans to utilize contributions from entities like Craig Newmark Philanthropies and Dragos. Despite limited federal funding, the initiative aims to deploy a suite of free cybersecurity tools to enhance the resilience of critical infrastructure across the U.S. Volunteers have successfully educated water utility managers on cyber risks, preventing potential breaches, such as phishing attacks, through proactive awareness training. The Franklin project exemplifies a community-driven approach to safeguarding essential services, emphasizing the need for robust cybersecurity measures in under-resourced sectors.
Details
2025-08-10 08:13:46 thehackernews VULNERABILITIES ReVault Attack Exposes Critical Flaws in Dell ControlVault3 Firmware
Cisco Talos researchers identified critical vulnerabilities in Dell's ControlVault3 firmware, affecting over 100 laptop models with Broadcom BCM5820X series chips. The ReVault attack allows bypassing Windows login, extracting cryptographic keys, and maintaining access even after OS reinstallations. Vulnerabilities can be exploited by chaining attacks to escalate privileges, bypass authentication, and maintain persistence in high-value environments. ControlVault, a hardware-based security solution, is used in industries requiring secure logins via smart card or NFC readers. No evidence suggests these vulnerabilities have been exploited in the wild, but they pose a significant risk for industries relying on strict security protocols. Mitigation measures include applying Dell's patches, disabling ControlVault services, and turning off fingerprint logins in high-risk scenarios. The vulnerabilities were presented at Black Hat USA, emphasizing the need for proactive security measures in firmware management.
Details
2025-08-10 00:40:02 theregister DATA BREACH TeleMessage Data Breach Exposes Sensitive Communications of Major Clients
Security researcher Micah Lee breached TeleMessage, revealing a 410GB database of communications, impacting clients like US Customs and Border Protection and JP Morgan. The breach exploited hardcoded credentials in the app's Android source code, allowing access to plain text messages stored on TeleMessage servers. Messages were accessible via a specific URL, leading to easy downloads of memory dumps containing sensitive information. The US Cybersecurity and Infrastructure Security Agency issued warnings about two security flaws, which TeleMessage has since addressed. The breach raises concerns about the security practices of messaging apps, especially those used by high-profile organizations and government agencies. TeleMessage's lack of encryption between their servers and archive destinations exposed sensitive communications, undermining its security claims. The incident underscores the critical need for robust operational security and regular security audits to prevent similar breaches in the future.
Details
2025-08-09 19:20:35 bleepingcomputer DATA BREACH Google Data Breach Exposes Potential Google Ads Customers' Information
Google confirmed a data breach involving its Salesforce CRM, affecting potential Google Ads customers' business contact details but not financial information. The breach was linked to ShinyHunters, a group known for targeting Salesforce customers, collaborating with Scattered Spider for initial system access. Threat actors used social engineering tactics to gain access, tricking employees into linking malicious apps to Salesforce environments. The attackers downloaded entire Salesforce databases and demanded ransoms, threatening to release data if not paid. Google's Threat Intelligence Group initially reported these attacks in June, with Google itself targeted in a subsequent incident. ShinyHunters has adopted new Python-based tools for quicker data exfiltration, moving away from traditional Salesforce Data Loader methods. Google has acknowledged the breach and is likely enhancing its defenses against such sophisticated social engineering and data theft tactics.
Details
2025-08-09 19:06:17 thehackernews VULNERABILITIES Lenovo Webcams Vulnerable to Remote BadUSB Exploits, Firmware Updates Released
Eclypsium researchers disclosed vulnerabilities in Lenovo 510 FHD and Performance FHD webcams, allowing remote attackers to exploit them as BadUSB devices. The vulnerabilities enable attackers to inject keystrokes and execute commands, bypassing traditional malware detection due to the attack's firmware-level nature. This marks a significant escalation in BadUSB threats, as Linux-based USB peripherals can now be remotely hijacked without physical access. Lenovo has responded by releasing firmware updates (version 4.8.0) and collaborated with SigmaStar to provide a tool addressing these security flaws. The vulnerabilities stem from the webcams' failure to validate firmware, exposing them to complete software compromise. The attack vector poses a risk to enterprise and consumer systems, as peripherals often run their own operating systems and accept remote commands. Organizations are urged to apply the firmware updates promptly to mitigate potential exploitation and enhance device security.
Details