Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 11815
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-07-03 10:35:54 | thehackernews | MISCELLANEOUS | Evaluating AI in SOC Platforms: Adaptive vs. Pre-Trained Models | SOC platforms with AI are split between adaptive AI, which can handle dynamic and novel alerts, and pre-trained AI, which is limited to predefined use cases.
Pre-trained AI models are built on large, labeled datasets from specific security scenarios and excel in efficiency and triage for known alert types.
However, pre-trained AI struggles with new or evolving threat types, creating operational blind spots and increasing manual analyst intervention.
Adaptive AI in contrast can analyze and triage novel alerts in real-time by dynamically researching and constructing new triage processes.
Utilizing multiple large language models (LLMs), adaptive AI platforms can effectively handle a diverse array of security tasks and continuously improve their response mechanisms.
The flexibility and real-time learning capabilities of adaptive AI ensure comprehensive coverage and rapid response across all alert types, effectively reducing the workload on human analysts.
Additional features in AI SOC platforms, like integrated response automation and cost-effective log management, are essential to enhance overall SOC efficiency and agility. | Details |
| 2025-07-03 10:04:40 | bleepingcomputer | MISCELLANEOUS | Microsoft Advises Ignoring False Windows Firewall Errors | Microsoft has alerted users that incorrect Windows Firewall errors may display following the installation of the June 2025 preview update.
The errors, identified as 'Event 2042' in Event Viewer, display a 'Config Read Failed' warning but are caused by an under-development feature.
Microsoft reassured that these errors, which appear exclusively on Windows 11 24H2 systems, do not affect firewall functionality or other Windows processes.
Users are advised to disregard these security event log errors, as they are linked to a feature that is yet to be fully integrated into the system.
Despite these false alarms, the Windows Firewall is expected to operate as normal without requiring any user intervention to resolve the reported errors.
Redmond is actively working to resolve this issue and will provide updates as new information becomes available.
This development follows a series of similar issues where Microsoft encountered erroneous system warnings without significant impact on system performance. | Details |
| 2025-07-03 09:34:56 | thehackernews | NATION STATE ACTIVITY | Chinese Hackers Target French Government Using Ivanti Zero-Days | The French cybersecurity agency identified a malicious campaign by Chinese hackers targeting sectors including government, telecom, and finance using zero-day vulnerabilities in Ivanti Cloud Services Appliance.
The hacking group, codenamed Houken and linked to UNC5174, employed sophisticated methods and a rootkit, exploiting vulnerabilities to gain initial network access.
Houken operates within a wider network, possibly acting as an initial access broker since 2023, facilitating multi-party exploitation of security flaws.
Recent attacks involved exploiting three specific Ivanti CSA device vulnerabilities, using tools like Behinder and GOREVERSE for persistence and lateral movement.
Attack tactics included employing HTTP proxy tunneling tools and a Linux kernel module enabling root-level remote command execution.
The attackers also undertook measures to patch exploited vulnerabilities, likely to block other malicious actors and maintain control over compromised systems.
Houken and UNC5174 are suspected of being operated by the same entity, likely targeting a diverse range of sectors globally, including governmental and educational institutions in Southeast Asia and the West.
In at least one instance, compromised access was used to deploy cryptocurrency miners, indicating financial motives alongside state-linked intelligence gathering. | Details |
| 2025-07-03 07:40:17 | theregister | MISCELLANEOUS | Let's Encrypt Offers Free TLS/SSL Certificates for IP Addresses | Let's Encrypt has started issuing free TLS/SSL certificates for IP addresses, a service previously cost between $40 and $90 annually from other CAs.
The initiative is aimed at users with static IP addresses, allowing secure connections to websites without the need for a domain name.
Most users access websites using domain names, which are easier to remember and manage compared to IP addresses.
IP addresses are often subject to change and lack the established dispute resolution mechanisms available for domain names.
Certificates for IP addresses are beneficial for scenarios like default landing pages for hosting providers or secure connections without a domain name.
Let's Encrypt advocates the short lifespan of such certificates, limiting them to six days to minimize the risks associated with potential certificate misuse.
The service will be generally available later this year after being introduced in Let's Encrypt’s Staging environment. | Details |
| 2025-07-03 06:32:19 | theregister | CYBERCRIME | AI Chatbots Misdirect Users, Fueling Phishing Opportunities | AI-powered chatbots often provide incorrect URLs when queried about the websites of major companies, presenting potential security risks.
Netcraft's research showed that these inaccuracies occur 34% of the time with AI responses, sometimes leading users to inactive or inappropriate sites.
Criminals could exploit these AI errors by registering unclaimed URLs suggested by chatbots and setting up phishing sites.
Recent testing revealed cases where chatbots directed users to phishing sites previously used in cybercrimes.
Phishing groups are adapting their strategies to capitalize on the growing use of AI-driven search tools over traditional search engines.
Schemes include manipulating AI search results by creating fake support documents and coding repositories on popular platforms like GitHub.
This technique mirrors supply chain attacks, but targets individual developers or coders by encouraging the adoption of compromised software or APIs. | Details |
| 2025-07-03 04:34:42 | thehackernews | MALWARE | Cisco Patches Critical Root Access Flaw in Unified Communications Manager | Cisco has addressed a critical vulnerability in its Unified Communications Manager (Unified CM) and Unified CM Session Management Edition.
The flaw, identified as CVE-2025-20309, enables attackers to log in as the root user due to static user credentials, achieving a maximum CVSS score of 10.0.
Unauthorized root access could lead to attackers executing arbitrary commands, monitoring voice communications, or manipulating system configurations.
The vulnerability was discovered internally by Cisco during security testing, with no evidence of exploitation in the wild reported.
Affected versions range from 15.0.1.13010-1 to 15.0.1.13017-1; Cisco has released software updates to mitigate the issue.
Log entries in "/var/log/active/syslog/secure" serve as indicators of compromise, highlighting successful exploit attempts.
This incident underscores the risks of hardcoded credentials in system development and the importance of thorough security practices even after deployment. | Details |
| 2025-07-02 22:41:19 | theregister | MALWARE | Cisco Issues Urgent Patch for Critical Communication Flaw | Cisco's Unified Communications Manager and Session Management Edition have hardcoded credentials in the Engineering-Special (ES) builds.
These critical vulnerabilities have received the highest rating (CVSS 10) and allow unauthenticated, remote attackers to gain full system control.
Affected versions are specific ES releases of Cisco Unified CM and Unified CM SME, numbering from 15.0.1.13010-1 to 15.0.1.13017-1.
Cisco has released a patch for the affected systems, only accessible through the Cisco Technical Assistance Center.
Administrators should verify system integrity by checking log entries and SSH login records for unauthorized access indicators.
This major security lapse marks Cisco’s second CVSS 10 flaw disclosed within a single week, highlighting significant security oversight.
There is no available workaround for this issue; the only solution is to apply the provided patch and upgrade to the newest code. | Details |
| 2025-07-02 20:49:39 | theregister | CYBERCRIME | CISA Issues Urgent Patch Alert for Vulnerable Signal Clone | CISA warns of active exploitation of vulnerabilities in the Signal clone TeleMessage TM SGNL used by national security staff.
Federal agencies directed to patch flaws or discontinue use by July 22, following discovery of bugs allowing data theft.
Vulnerabilities identified include CVE-2025-48927 and CVE-2025-48928, which allow unauthorized data access and sensitive information leaks.
The flaws exposed include a misconfigured endpoint that could lead to downloading memory dumps and another that exposes passwords over HTTP.
TeleMessage gained attention post-Signalgate incident, where a journalist was inadvertently added to a sensitive group chat meant for record-keeping.
Over 60 government personnel’s chat logs were recently leaked, emphasizing the urgency and severity of the security flaws.
These vulnerabilities represent significant risks to the federal enterprise, necessitating immediate and mandatory remedial actions by agencies. | Details |
| 2025-07-02 19:40:16 | bleepingcomputer | NATION STATE ACTIVITY | North Korean Hackers Deploy Advanced NimDoor Malware on macOS | North Korean state-backed hackers have launched a sophisticated malware campaign targeting web3 and cryptocurrency entities using a new macOS malware dubbed NimDoor.
NimDoor involves reaching out to victims via Telegram and tricking them into downloading a fake Zoom SDK update through platforms such as Calendly and email.
The malware features unique elements like an unusual signal-based persistence mechanism, which reinstalls itself when attempts are made to terminate it.
Core components of NimDoor, such as 'GoogIe LLC' and 'CoreKitAgent', are used to manage persistent access, collect system data, and deploy further payloads effectively.
CoreKitAgent uses AppleScript and WSS-based communications to exfiltrate data and facilitate remote command execution, enhancing its backdoor capabilities.
SentinelOne researchers have identified this attack as part of a larger trend of increased sophistication in malware developed by North Korean threat actors.
The report provides detailed technical insights into the payloads, obfuscation techniques, and operational structures of the NimDoor malware family.
Indicators of compromise and other technical data related to the malware and its operations targeting sensitive cryptocurrency information have been documented. | Details |
| 2025-07-02 19:15:02 | bleepingcomputer | CYBERCRIME | DOJ Probes Ex-Negotiator for Alleged Ransomware Kickback Scheme | The Department of Justice (DOJ) is investigating a former ransomware negotiator suspected of collaborating with ransomware gangs to secure extortion payments and receive kickbacks.
The individual under scrutiny previously worked for DigitalMint, a company specializing in ransomware negotiation and cryptocurrency payments for decryptors.
DigitalMint, which has handled over 2,000 ransomware negotiations since 2017, terminated the employee upon discovering the alleged misconduct and is cooperating with law enforcement.
The investigation is focused on whether the ex-employee manipulated negotiations to increase ransom payments, from which they allegedly received a cut.
As a result of the ongoing investigation, some law and insurance firms have advised clients to refrain from using DigitalMint's services.
DigitalMint asserts they are not the target of the DOJ investigation but have communicated details of the incident to affected stakeholders to maintain trust.
A 2019 ProPublica report highlighted similar unethical practices in the U.S. data recovery industry, exposing firms that paid ransoms to cybercriminals while billing clients for data restoration. | Details |
| 2025-07-02 17:34:55 | theregister | DATA BREACH | Nonprofit TTAM to Prioritize Data Safety in 23andMe Acquisition | TTAM Research Institute is set to acquire genetic testing company 23andMe following its recent Chapter 11 bankruptcy, sparked by a massive data breach in 2023.
The data breach compromised approximately 14,000 accounts and indirectly affected around 7 million people due to a credential-stuffing attack by "Golem."
23andMe faced severe backlash for poor incident response and inadequate security measures, resulting in a $3.13 million fine by the UK’s Information Commissioner’s Office.
TTAM, founded by 23andMe’s former CEO Anne Wojcicki, assures to uphold stringent data protection standards, intending to continue research and expand educational activities around human genetics.
The nonprofit has pledged to maintain transparency and allow customers continued control over their genetic data, with options to erase their data permanently.
Customers are reassured that no action is needed on their part and that TTAM will operate with the same privacy protocols and staff as before the acquisition. | Details |
| 2025-07-02 17:34:54 | bleepingcomputer | CYBERCRIME | Spain Arrests Hackers for High-Profile Data Theft Against State | Spanish police apprehended two cybercriminals in Las Palmas for stealing data from government officials and journalists.
The arrested individuals were deemed a significant threat to national security and used the stolen data to gain notoriety and inflate its selling price online.
The investigation was initiated after the detection of personal data leaks from top state institutions on various media platforms.
One suspect specialized in data exfiltration, while the other managed sales and finances, including handling a cryptocurrency wallet.
Numerous electronic devices were seized during home raids, potentially leading to further evidence or identifying additional accomplices.
This arrest follows a series of successful operations against high-profile cybercriminals in Spain, including breaches of national and international security organizations.
The police's continuous efforts highlight Spain's proactive measures to combat cybercrime and safeguard sensitive information. | Details |
| 2025-07-02 17:17:24 | thehackernews | NATION STATE ACTIVITY | North Korean Hackers Escalate Attacks on Web3 and South Korean Targets | North Korean hackers have intensified their cyber operations by targeting Web3 platforms and South Korean national security experts using sophisticated malware and social engineering techniques.
Cybersecurity firms SentinelOne and Genians documented separate but related campaigns involving the use of Nim and C++ programming languages to deploy malware and steal data.
Attack vectors include misleading emails, deceptive links, and fake Zoom update requests that lead to the installation of persistent and information-stealing malware on macOS systems.
The malware utilized in these campaigns demonstrates advanced capabilities such as credential harvesting from popular web browsers, extracting Telegram data, and evading user-initiated termination.
Techniques such as the employment of AppleScript for process control, and the use of GitHub for malware staging and command-and-control communications highlight the evolving sophistication of the threat actors.
The "ClickFix" tactic, previously documented in phishing scenarios, has evolved to trick users into manual interactions that facilitate malware deployment.
These ongoing activities underline the persistent threats posed by North Korean hacker groups like Kimsuky, which continue to adjust and refine their cyberattack methods against regional and technological targets. | Details |
| 2025-07-02 17:17:23 | bleepingcomputer | CYBERCRIME | Cisco Removes Hardcoded Credentials from Unified CM | Cisco has issued a security advisory for a severe vulnerability in its Unified Communications Manager.
The flaw, identified as CVE-2025-20309, involves hardcoded root SSH credentials that could enable remote attackers to access devices with root privileges.
Affected versions include Unified CM and Unified CM SME Engineering Special releases from 15.0.1.13010-1 to 15.0.1.13017-1.
There are no alternative workarounds; the vulnerability can only be mitigated by upgrading to newer software versions or applying a specific patch.
Cisco has not detected any active exploitation of this vulnerability but has provided indicators of compromise to help administrators assess their systems.
This incident adds to a list of issues with hardcoded credentials previously discovered in other Cisco products.
The company stressed the importance of monitoring system logs for unauthorized access attempts, with detailed instructions on how to retrieve relevant log entries. | Details |
| 2025-07-02 16:23:29 | bleepingcomputer | DDOS | Citrix Faces Login Issues After Patching NetScaler Vulnerabilities | Citrix has issued warnings about potential login disruptions on NetScaler ADC and Gateway appliances following patches for severe security vulnerabilities.
Patching the vulnerabilities, which could lead to authentication bypass and denial-of-service attacks, triggers issues due to the newly default-enabled Content Security Policy (CSP).
The implemented CSP is intended to mitigate risks like cross-site scripting and code injections but inadvertently blocks legitimate scripts required for authentication methods like DUO, SAML, or other IDP configurations.
The disruptions manifest as broken login pages, particularly under configurations relying on custom scripts not compliant with the strict CSP rules.
Two critical vulnerabilities identified, CVE-2025-5777 ("Citrix Bleed 2") and CVE-2025-6543, are addressed by the patches; the latter is actively exploited in DoS attacks.
Citrix recommends that administrators disable the CSP temporarily and clear the cache to resolve the login issues while further solutions are developed.
Citrix offers further assistance through their support team for unresolved issues post-CSP adjustment. | Details |