Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11819

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-06-28 14:10:50 bleepingcomputer MISCELLANEOUS Let's Encrypt to Cease Email Notifications for Certificate Renewals
Let's Encrypt will stop sending emails about certificate expirations starting June 4, 2025, to reduce costs, enhance privacy, and simplify operations. As a major Certificate Authority, Let's Encrypt issues millions of certificates and advocates for automated renewal processes through the ACME protocol. The shift away from email alerts is largely due to the adoption of automated technologies which diminish the need for manual email notifications. Recent standards changes leading to shorter certificate lifespans make manual management less practical and promote the use of automated systems. The operation costs of maintaining the email notification service are significant, prompting a reallocation of funds to more critical infrastructure needs. Handling a large database of email addresses for notifications adds unnecessary complexity and potential privacy issues to Let's Encrypt's operations. Users are advised to adopt ACME-compatible tools for automated certificate management and consider external services for renewal alerts if needed.
Details
2025-06-28 09:49:17 thehackernews CYBERCRIME FBI Alerts on Scattered Spider's Social Engineering Attacks on Airlines
The FBI has documented expanding cyber assaults by Scattered Spider, specifically targeting the airline industry via sophisticated social engineering tactics. These attacks often involve impersonating employees to manipulate IT help desks into granting unauthorized access and adding devices to multi-factor authentication (MFA) systems. Palo Alto Networks and Mandiant have noticed similar patterns, emphasizing the necessity for the aviation sector to enhance help desk verification processes to prevent security breaches. Scattered Spider exploits human factors by building false trust with help desk personnel, leading to significant data theft, extortion, and ransomware incidents. The group uses a combination of social media research and public breach data for precise impersonation, elevating their threat across both on-prem and cloud environments. Recently, Scattered Spider focused on high-value targets, such as CFOs, to gain access to critical systems by circumventing strong technical defenses through social engineering. Recommendations for the industry include tightening internal processes around identity verification and training personnel with real-world attack simulations to counter such threats effectively. This evolving threat landscape requires continuous reassessment of ID verification protocols to mitigate risks associated with human error in securing sensitive information.
Details
2025-06-28 08:04:35 thehackernews MALWARE GIFTEDCROOK Malware Update Boosts Intelligence-Gathering Capabilities
GIFTEDCROOK malware, initially a basic browser data stealer, has evolved into a sophisticated intelligence-gathering tool targeting Ukrainian military and government entities. Recent versions of the malware can exfiltrate sensitive documents and browsing data, indicating a shift from simple credential theft to comprehensive espionage. The malware is deployed via phishing emails with macro-laced Excel documents, exploiting common workplace file expectations to bypass security measures. Enhanced features include document theft, specifically targeting files created or modified within the last 45 days and smaller than 7 MB, across a variety of file types. Stolen data is packaged into ZIP archives and discreetly exfiltrated to an attacker-controlled Telegram channel, avoiding large-file detection methods to slip past network defenses. A final cleanup stage involves a batch script that erases evidence of the malware from the infected systems, covering the tracks of the cyber espionage activity. The timing and focus of the GIFTEDCROOK campaigns align with significant geopolitical events, suggesting that malware development is being driven by strategic objectives related to Ukraine-Russia relations.
Details
2025-06-28 07:22:20 thehackernews DATA BREACH Facebook’s New AI Tool Poses Privacy Concerns with Photo Uploads
Facebook introduces a new AI feature requesting users to upload photos for personalized content suggestions, raising privacy issues. The feature prompts users to allow cloud processing of images from their camera roll for creating personalized Facebook Stories. Meta assures that the uploaded media will be used solely for suggestion purposes and not for ads targeting, and will be checked for safety and integrity. This AI processing is currently limited to users in the United States and Canada and is opt-in, allowing users to disable it at any time. Meta has faced similar privacy concerns globally, recently suspending AI tools in Brazil and adjusting public data usage for AI training in the EU following regulatory scrutiny. The concern extends beyond Facebook, with other tech giants like Apple and Google being urged by German authorities to halt app distributions due to unlawful data transfers to China. These tech developments come amid broader discussions on AI's impact on privacy and data protection standards globally, highlighting the tension between technological advancement and user rights protection.
Details
2025-06-27 23:05:07 theregister CYBERCRIME Criminals Exploiting US Healthcare System for Financial Fraud
Criminals are impersonating insurance companies via emails and texts to steal sensitive health and payment information. The FBI has issued a security alert warning both patients and healthcare providers about these fraudulent schemes. These attacks trick victims into revealing protected health data and financial details under the guise of addressing insurance claims or payment discrepancies. The Health Information Sharing and Analysis Center (Health-ISAC) reports a rise in similar phishing and social-engineering scams targeting the healthcare sector, exploiting its complex billing system. Criminals leverage previously stolen data to enhance the credibility of their fraudulent communications, employing common confidence tricks to mislead healthcare employees. These cybercriminal groups, possibly including state-sponsored actors, are highly organized and financially motivated, focusing on direct financial theft via fraudulent transactions. The FBI advises verifying all unsolicited messages and direct communications for authentication instead of replying or using the provided contact information. Enhanced deception tactics now include the use of AI by cybercriminals to refine scams, making them harder to detect.
Details
2025-06-27 18:27:59 bleepingcomputer NATION STATE ACTIVITY Scattered Spider Hackers Expand Attacks to Aviation and Transport
Scattered Spider, a group known for social engineering and MFA attacks, has now targeted aviation and transportation sectors. Initially focusing on retail, the threat actors have been linked to attacks on major companies like M&S and Co-op, later moving to the insurance businesses like Aflac and Erie Insurance. Recent breaches include cyberattacks on Canada's WestJet and Hawaiian Airlines, disrupting services and raising security concerns. The group gains access through sophisticated tactics like self-service password resets, registering their own MFA, and targeting help desk systems. Experts from Palo Alto Networks and Mandiant have warned that organizations in these sectors should be on high alert and enhance their identity verification processes. Scattered Spider collaborates with Russian-speaking ransomware gangs and has attacked other notable companies such as Twilio and Coinbase. Recommendations have been made to secure password reset platforms and help desks, which are frequent targets of these threat actors.
Details
2025-06-27 17:32:30 theregister MISCELLANEOUS Cisco Innovates AI-Ready Datacenters with Integrated Security
Cisco is emphasizing the integration of security with network infrastructure, crucial for supporting "agentic AI" applications, using technology like their new Catalyst switches. The move necessitates significant changes in datacenters, potentially requiring complete overhauls of network arrangements to accommodate AI operations. During Cisco's Innovation Tech Talk, President Jeetendra Patel discussed the transition from basic AI to advanced AI agents capable of autonomous tasks, highlighting the evolution and subsequent infrastructure demands. Cisco's introduction of smart switches with dedicated data processing units supports real-time traffic analysis and embedded network security. The holistic approach combines networking and security into a cohesive operational fabric, a distinctive capability that Cisco believes sets it apart in the market. Potential disruptions in merging network operations (NetOps) and security operations (SecOps) are acknowledged, with implications for widespread changes in corporate IT infrastructure management. Cisco positions itself as a leader in providing the necessary tools for future-proof datacenters in the era of advanced, autonomous AI functions, though enterprise adoption remains cautious.
Details
2025-06-27 17:04:05 theregister CYBERCRIME Hawaiian Airlines Reports IT System Cybersecurity Incident
Hawaiian Airlines experienced a cybersecurity incident affecting IT systems but maintained normal flight operations. The incident was first noticed on June 23, with formal disclosure following on June 27 through an SEC filing. Immediate measures were taken to secure operations and systems, with assistance from authorities and cybersecurity experts. As of the latest updates, there has been no impact on passenger safety or travel schedules. The extent of data potentially accessed, including customer or employee information, remains unclear, and it is unknown if ransomware was involved. The airline is continuously working with experts and federal authorities to navigate and mitigate the cybersecurity event. The FAA has confirmed ongoing safe operations and is closely monitoring the situation in cooperation with Hawaiian Airlines. This incident follows a similar cybersecurity disruption faced by Canadian airline WestJet earlier.
Details
2025-06-27 16:03:46 thehackernews NATION STATE ACTIVITY China-Linked Espionage Campaign Affected Over 1,000 SOHO Devices
More than 1,000 small office and home office (SOHO) devices have been compromised in a China-affiliated espionage campaign named LapDogs. The devices were infected with a custom backdoor named ShortLeash, which masquerades as an Nginx web server and impersonates the Los Angeles Police Department. Infections are widespread across the United States, Southeast Asia, Japan, South Korea, Hong Kong, and Taiwan, impacting sectors like IT, networking, real estate, and media. The campaign employs N-day vulnerabilities for initial access and has been active since at least September 6, 2023, with ongoing attacks. LapDogs operates through devices and services by manufacturers such as Ruckus Wireless, ASUS, Buffalo Technology, Cisco-Linksys, and others. ShortLeash maintains persistence by embedding as a service file in the system directory, ensuring it remains active even after device reboots. There are similarities between LapDogs and another cluster called PolarEdge, though they are considered separate entities due to differences in infection and persistence tactics. The LapDogs network is linked to Chinese hacking group UAT-5918, indicating its use in targeted operations against Taiwanese targets.
Details
2025-06-27 15:29:45 theregister MISCELLANEOUS Innovative Hack Turns Car into Video Game Controller
Pen Test Partners transformed a 2016 Renault Clio into a controller for the video game SuperTuxKart by manipulating Controller Area Network (CAN) data. The experiment aimed to provide a creative demonstration of handling and manipulating CAN data for automotive cybersecurity training. CAN data, which signals vehicle operations such as braking and acceleration, was decoded and mapped to game controls using Python. Challenges included adjusting the CAN bus to improve game control responsiveness and setting realistic in-game steering limits to avoid tire wear. Technical hurdles such as battery drainage, system crashes, and the vehicle's engine auto-shutoff feature were managed during the demonstration. Additionally, certain in-game functionalities like using items could not be integrated as they do not utilize CAN data signals. Overall, this project showcased an inventive application of vehicle data handling and cybersecurity principles in a gamified environment.
Details
2025-06-27 14:38:02 bleepingcomputer MALWARE Critical Citrix Vulnerability Exploited in Recent Cyberattacks
A new vulnerability in Citrix NetScaler ADC and Gateway systems, known as "Citrix Bleed 2" (CVE-2025-5777), is likely being exploited. Cybersecurity firm ReliaQuest observed an increase in suspicious activity hinting at targeted attacks exploiting this flaw. Citrix Bleed 2 enables unauthorized access to sensitive data such as session tokens and credentials, potentially allowing attackers to hijack user sessions and sidestep multi-factor authentication. Although Citrix released patches for the vulnerability on June 17, 2025, there is medium confidence among experts that the vulnerability has been exploited in the wild prior to widespread patching. Citrix advised users to terminate all ICA and PCoIP sessions after applying updates to prevent access to possibly compromised sessions. Users unable to immediately install the security patches are recommended to limit external access to affected NetScaler devices through network ACLs or firewalls. Critical response actions include reviewing suspicious activity in active sessions and using specific commands to terminate these sessions securely.
Details
2025-06-27 14:20:51 bleepingcomputer CYBERCRIME Critical Citrix Bleed 2 Vulnerability Likely Exploited in Recent Attacks
ReliaQuest has observed an increase in suspicious activity indicating potential exploitation of the Citrix Bleed 2 vulnerability (CVE-2025-5777). This vulnerability involves an out-of-bounds memory read, allowing unauthenticated attackers to steal session tokens and credentials, effectively hijacking user sessions and bypassing multi-factor authentication. Citrix addressed the vulnerability with a security update on June 17, 2025, but recent signs suggest that attackers are actively exploiting it. Beaumont initially named and highlighted the similarity of CVE-2025-5777 to a previous vulnerability, emphasizing the high risk of exploitation. Citrix recommends terminating all active ICA and PCoIP sessions after applying the security updates to prevent misuse of possibly hijacked sessions. Administrators should monitor and review active sessions for any unusual activity before terminating them to ensure security. In cases where immediate update installation is not feasible, it is advised to limit external access to the vulnerable Citrix devices through network ACLs or firewall rules.
Details
2025-06-27 13:43:11 theregister DATA BREACH Ahold Delhaize Announces Data Breach Affecting 2.2M Individuals
Ahold Delhaize, a major global grocery and retail company, reported a significant data breach affecting approximately 2.2 million people, involving personal, financial, and health details. The breach occurred during a cyberattack in November and disrupted operations across various Ahold Delhaize brands including Food Lion and Stop & Shop. The breach primarily involved current and former employee data, but there's no mention of customer data theft in the disclosed notifications. Affected individuals, notably in the US, have been offered free credit monitoring and identity protection services for two years. The nature of the cyberattack is suspected to be ransomware, with the group "INC Ransom" claiming responsibility and leaking documents online. Ahold Delhaize has engaged external cybersecurity experts to secure the affected systems and continues to investigate and fortify their digital security measures. This breach adds to the ongoing challenges faced by the retail sector with cybersecurity experts highlighting the substantial financial and operational impacts of cyberattacks.
Details
2025-06-27 13:27:40 thehackernews NATION STATE ACTIVITY Mustang Panda's Cyber Espionage Campaign Targets Tibetan Community
Mustang Panda, linked to China, has launched a cyber espionage campaign aimed at the Tibetan community. Spear-phishing emails with content related to Tibet were used to distribute malware including PUBLOAD and Pubshell. IBM X-Force identified the threat under the name Hive0154, with observed tactics including DLL side-loading for malware deployment. The campaign employs decoy documents and executable files to infect systems and facilitate remote access via a lightweight backdoor known as Pubshell. Mustang Panda’s activities span across various nations targeting government and military sectors with similar weaponized files delivered through Google Drive. Recent iterations of their attacks also utilized a USB worm called HIUPAN for spreading malwares through removable drives. Security experts noted the sophistication, development frequency, and extensive malware toolset of Mustang Panda, emphasizing ongoing threats to East Asia-based organizations.
Details
2025-06-27 11:04:55 thehackernews MISCELLANEOUS Enhancing SOC Efficiency with Agentic AI Analysts
Security operations centers (SOCs) are facing increasing threats with limited budgets, necessitating more efficient operations. Agentic AI SOC Analysts automate routine tasks, reduce false positives, and enable reallocation of human analysts to more critical tasks, aligning with business goals of resilience and efficient growth. The global shortage of skilled cybersecurity workers, estimated at 4 million, exacerbates the need for AI in improving SOC productivity and effectiveness. AI-driven analysts can help reduce false positive alerts by up to 90%, allowing human analysts to focus on high-risk activities and strategic initiatives. By automating tasks like log analysis and evidence linking, AI SOC Analysts boost investigation speeds and the overall throughput of security teams. Advanced AI systems continuously learn and adapt, improving the accuracy of threat investigations and reducing false positives over time. Prophet Security's agentic AI platform helps integrate AI capabilities into existing security stacks, enhancing return on investment (ROI) and training junior analysts through consistent, methodical investigative processes. Organizations leveraging AI-driven SOC analysts can significantly improve key SOC performance metrics, directly impacting their security posture and business outcomes.
Details