Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12600

Checks for new stories every ~15 minutes

Title Summary
ROWS
2026-01-13 02:55:53 theregister CYBERCRIME India Tightens Crypto Regulations to Combat Financial Crimes
India has introduced stricter regulations for cryptocurrency service providers to address fraud, money laundering, and terrorism financing concerns. The Financial Intelligence Unit of India mandates crypto entities serving Indian residents to register, name officers, and disclose business ownership details. New guidelines require detailed customer due diligence, including identity documents, bank details, and geolocation data, to verify authenticity. Crypto firms must collect selfies from new customers to confirm their identity and ensure they are real individuals. Continuous transaction monitoring and reporting of suspicious activities are now compulsory, targeting transactions with potential criminal or terrorist links. These measures aim to prevent misuse of virtual digital assets by illicit actors while aligning with existing financial regulations. The inclusion of offshore crypto players in these requirements reflects India's broader strategy to regulate tech companies operating within its market.
Details
2026-01-12 23:11:31 bleepingcomputer CYBERCRIME Dutch Hacker Sentenced for Breaching European Ports' IT Systems
A Dutch hacker received a seven-year prison sentence for hacking ports in Rotterdam and Antwerp to facilitate drug trafficking. The individual was convicted of computer hacking, attempted extortion, and importing 210kg of cocaine into the Netherlands. Authorities intercepted communications on Sky ECC, an encrypted chat service, which played a key role in the conviction. The hacker infiltrated port IT systems via employees using USB sticks loaded with malware, enabling remote access and data exfiltration. Despite defense claims of procedural violations, the court upheld the conviction, dismissing objections about the legality of obtained communications. The operation, supported by Europol's decryption of Sky ECC, led to multiple arrests, including the chat service's CEO. This case underscores the ongoing threat of cybercrime in facilitating organized crime and drug trafficking activities.
Details
2026-01-12 22:43:36 theregister CYBERCRIME Key Foxtrot Network Organizer Arrested for Violence-as-a-Service Operations
A 21-year-old Swedish man, linked to the Foxtrot criminal network, was arrested in Iraq for orchestrating violence-as-a-service, with extradition proceedings to Sweden currently underway. The suspect faces charges including instigated murder and conspiracy to commit murder, with accusations of exploiting minors to execute violent acts. The arrest was part of a coordinated effort between Iraqi and Swedish authorities, highlighting international collaboration in tackling organized cybercrime. Europol's Operational Taskforce GRIMM, targeting cross-border violent crime, has identified the suspect as a "high-value target" due to his central role in these operations. A second individual connected to Foxtrot was also arrested, facing charges related to conspiracy and public destruction, further implicating the network's reach. The Foxtrot network, along with the Dalen network, has been systematically exploiting vulnerable youth, including those with disabilities, for criminal activities. The broader operation, GRIMM, has led to 193 arrests in its first six months, amid rising concerns over cybercrime involving physical violence across Europe. The FBI has flagged a related group, In Real Life (IRL) Com, as a growing threat, particularly to young people, due to their involvement in cyber and physical crimes.
Details
2026-01-12 22:43:36 theregister VULNERABILITIES Global Memory Shortage Threatens Firewall Costs and Margins in 2026
The global memory shortage is set to significantly impact the cybersecurity market, with firewall costs expected to rise sharply by 2026, affecting both vendors and customers. Fortinet, Palo Alto Networks, and Check Point face challenges in managing increased DRAM costs, which are crucial for their next-generation firewall systems. Palo Alto Networks may mitigate some impact due to its larger DRAM inventory, potentially lessening the financial blow from rising memory prices. Fortinet and Palo Alto Networks reported declining gross margins in recent earnings, indicating financial pressure from increased production costs. Check Point has already implemented a 5% price increase to counteract DRAM cost impacts, softening the financial impact on its quantum business. DRAM prices are projected to rise by up to 70% this quarter, with a potential doubling of costs by mid-2026, according to industry reports. Strategic inventory management and pricing adjustments are critical for firewall vendors to navigate the financial challenges posed by the memory shortage.
Details
2026-01-12 21:07:16 bleepingcomputer CYBERCRIME Cybercriminals Exploit Browser-in-Browser Technique for Facebook Phishing
Cybercriminals increasingly use the Browser-in-the-Browser (BitB) technique to deceive Facebook users into revealing their credentials, posing a significant threat to over three billion active users. The BitB method, developed in 2022, involves fake pop-up windows mimicking legitimate login interfaces, making it challenging for users to detect the phishing attempt visually. Recent phishing campaigns impersonate law firms or Meta security alerts, using fake pop-ups and shortened URLs to enhance credibility and evade detection. Attackers host phishing pages on legitimate cloud platforms like Netlify and Vercel, exploiting trusted infrastructure to bypass traditional security filters. Trellix researchers note this technique marks a major escalation in phishing tactics, leveraging user familiarity with authentication processes to facilitate credential theft. Users are advised to navigate directly to official URLs for security alerts and enable two-factor authentication to add a protective layer against account takeovers. This development underscores the need for heightened vigilance and robust security practices to protect personal and organizational data from evolving cyber threats.
Details
2026-01-12 20:13:20 bleepingcomputer VULNERABILITIES CISA Mandates Urgent Patching of Gogs RCE Vulnerability in Agencies
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has directed federal agencies to address a critical Gogs vulnerability, CVE-2025-8110, actively exploited in zero-day attacks. Gogs, a GitLab and GitHub Enterprise alternative, is vulnerable due to a path traversal flaw in its PutContents API, allowing attackers to execute arbitrary commands. The vulnerability was discovered by Wiz Research during a malware investigation and reported to Gogs maintainers in July, with patches released in late October. Over 1,400 Gogs servers are exposed online, with more than 700 showing compromise signs; CISA has added this flaw to its list of actively exploited vulnerabilities. Federal Civilian Executive Branch agencies must patch the vulnerability by February 2, 2026, to mitigate risks posed by potential malicious cyber actors. CISA advises disabling open-registration settings and using VPNs or allow lists to limit server access, enhancing security against future attacks. Administrators should monitor for suspicious PutContents API usage and random repository names as indicators of compromise.
Details
2026-01-12 19:57:33 bleepingcomputer CYBERCRIME Apex Legends Experiences Character Hijacking Incident in Live Matches
Apex Legends players faced disruptions as threat actors hijacked characters, disconnected users, and altered nicknames during live gameplay sessions. Respawn Entertainment confirmed the incident, clarifying it was not due to an exploit or malware but involved unauthorized control of player inputs. The game maintains a robust user base, with about half a million daily concurrent players, emphasizing the impact of such disruptions. Initial investigations revealed no evidence of remote code execution or injection attacks, suggesting administrative privilege abuse on the server. Players reported aggressive disruptions, including server disconnections and use of cheats, hinting at elevated access by the attackers. Respawn resolved the issue within six hours but did not disclose detailed technical findings, attributing the incident to cheating activities. The incident recalls a previous security breach during a tournament, affecting player trust and highlighting ongoing challenges in game security.
Details
2026-01-12 18:49:05 bleepingcomputer CYBERCRIME University of Hawaii Cancer Center Suffers Ransomware Breach
The University of Hawaii Cancer Center experienced a ransomware attack in August 2025, compromising data from a specific research project and affecting historical records with Social Security numbers. The breach did not impact clinical operations or patient care but delayed restoration efforts due to system encryption and the need for a thorough investigation. Upon discovering the attack, the university disconnected affected systems, engaged cybersecurity experts, and notified external stakeholders to manage the incident. A ransom was paid to obtain a decryption tool and ensure the secure destruction of stolen data, aiming to protect individuals' sensitive information. The university is in the process of notifying affected individuals once their contact information is confirmed, prioritizing transparency and responsibility. In response, UH implemented enhanced security measures, including endpoint protection, system replacements, password resets, and third-party security audits. This incident is part of a broader trend of cyberattacks on educational institutions, highlighting the ongoing threat landscape faced by universities.
Details
2026-01-12 18:34:08 theregister MISCELLANEOUS AI Security Risks Gain Attention as Business Leaders Prioritize Resilience
A recent World Economic Forum survey reveals 64% of business leaders now assess AI security risks before deployment, a significant increase from 37% last year. AI is expected to drive major cybersecurity changes by 2026, with 94% of respondents predicting its impact, and 87% noting rising vulnerabilities. Prompt injections and AI code assistant flaws are identified as primary security concerns, with Google addressing issues in its Gemini project. Data leaks and adversarial advancements are top fears, while geopolitical tensions influence 64% of organizations' cyber risk strategies. Larger enterprises are more affected by geopolitical factors, with 91% adjusting security plans, compared to 59% of smaller firms. The survey indicates a shift in threat focus, with cyber-enabled fraud and AI vulnerabilities overtaking ransomware and supply chain disruptions. Cyber resilience remains crucial, with 64% meeting basic standards, yet only 19% exceed them, highlighting ongoing challenges in minimizing attack impacts.
Details
2026-01-12 17:52:51 bleepingcomputer DATA BREACH Target Investigates Potential Source Code Breach on Gitea Platform
Hackers claim to have accessed and are selling Target Corporation's internal source code, with samples posted on Gitea, a software development platform. The dataset allegedly includes 860 GB of data, with a directory listing over 57,000 lines long, indicating a significant breach if verified. The exposed repositories contained internal system references and metadata linked to current Target engineers, suggesting an internal origin. Following inquiries from BleepingComputer, Target's Git server was taken offline, and the repositories were removed, indicating a potential containment effort. The breach, if confirmed, could expose proprietary information, impacting Target's competitive edge and operational security. Target has not confirmed the breach but is likely conducting an internal investigation to assess the extent and impact of the potential data exposure. This incident serves as a reminder of the importance of securing development environments and monitoring for unauthorized access to prevent data leaks.
Details
2026-01-12 16:49:19 theregister VULNERABILITIES Block's AI Agent Goose Faces Prompt Injection Security Challenges
Block's AI agent, Goose, experienced a security breach via a prompt injection attack, leading to the installation of infostealer malware on an employee's laptop. The attack exploited Goose's "recipes," or reusable workflows, using hidden Unicode characters to disguise malicious commands, highlighting vulnerabilities in AI-driven systems. Block's security team employed red teaming exercises to identify and mitigate potential threats, enhancing Goose's resilience against prompt injection attacks. New security features include recipe install warnings, desktop alerts for suspicious Unicode characters, and mechanisms to detect and remove invisible characters. Block is exploring adversarial AI techniques to further secure Goose, using AI to validate inputs and monitor outputs for potential threats. The company is refining these measures internally, ensuring they do not overwhelm analysts with false alerts, before integrating them into the open-source version. Block's proactive approach in addressing AI vulnerabilities positions it as a leader in AI security research and development.
Details
2026-01-12 16:40:04 thehackernews VULNERABILITIES Supply Chain Attack Targets n8n Platform to Steal OAuth Tokens
Threat actors uploaded eight malicious packages to the npm registry, posing as n8n integrations, to steal OAuth credentials from developers. A package mimicking a Google Ads integration tricked users into linking accounts, allowing attackers to siphon credentials to their servers. The attack marks a significant escalation in supply chain threats, exploiting workflow automation platforms as centralized credential vaults. Identified malicious packages have been removed, but some libraries linked to attackers remain available, raising concerns over potential threats. The campaign is ongoing, with recent updates to malicious packages suggesting continued risk to n8n users. Developers are advised to audit packages, scrutinize metadata for anomalies, and use official n8n integrations to mitigate risks. N8n recommends disabling community nodes on self-hosted instances to prevent malicious actions and unauthorized access to sensitive credentials. The incident underscores the importance of securing supply chains, as untrusted workflows can significantly expand the attack surface.
Details
2026-01-12 16:27:44 bleepingcomputer VULNERABILITIES Telegram Proxy Links Vulnerability Exposes User IP Addresses
Security researchers discovered that Telegram proxy links can reveal user IP addresses when clicked, posing a privacy risk for users seeking anonymity. Telegram's Android and iOS clients automatically test proxy connections, inadvertently exposing real IP addresses to potential attackers. Attackers can exploit this by creating disguised proxy links that appear as harmless usernames, leading users to connect to attacker-controlled proxies. The exposed IP addresses can be used for location tracking, denial-of-service attacks, or other targeted malicious activities. Telegram has acknowledged the issue and plans to implement warnings for proxy links to alert users of potential risks. Users are advised to exercise caution with Telegram links, particularly those resolving to t.me domains, to prevent unintended IP exposure. The vulnerability highlights the need for increased user awareness and security measures in messaging platforms to protect user privacy.
Details
2026-01-12 16:01:22 bleepingcomputer DATA BREACH Endesa Data Breach Exposes Customer Information Amidst Ongoing Investigation
Endesa, Spain's largest electric utility, reported a breach affecting customer data, impacting its commercial platform and Energía XXI operator. The breach involved unauthorized access to contract-related personal details, though account passwords remain secure, according to the company. Endesa has blocked compromised accounts, initiated log analysis, and is notifying affected customers while heightening monitoring efforts. The Spanish Data Protection Agency and relevant authorities have been informed, with no evidence yet of fraudulent data use. Customers are advised to watch for identity theft and phishing, with a hotline provided for reporting suspicious activities. Threat actors claim to possess 1TB of Endesa's customer data, offering it for sale, aligning with the breach details disclosed by the company. Energía XXI assures that the incident has not disrupted operations or services, maintaining service continuity for customers.
Details
2026-01-12 14:48:01 bleepingcomputer DATA BREACH Mitigating Microsoft 365 Data Risks Through Access Reviews
Organizations utilizing Microsoft 365 face significant data security risks due to rampant and unmanaged content sharing among users, which can lead to potential data leaks or breaches. Microsoft 365's ease of document sharing lacks centralized oversight, leaving companies vulnerable to oversharing, where sensitive information is shared excessively or longer than necessary. Current native tools within Microsoft 365 fail to provide adequate visibility or control over shared content, creating a substantial security blind spot. Tenfold Software introduces an Identity Governance solution offering comprehensive access reviews for shared content across Teams, OneDrive, and SharePoint. The solution provides users with a personal review dashboard to manage and revoke outdated sharing links and permissions, enhancing data security. Implementing regular access reviews with Tenfold's solution can significantly reduce the risk of data exposure while maintaining the collaborative benefits of Microsoft 365. Organizations are encouraged to adopt such governance tools to address the security gaps in cloud privilege management and prevent potential data exfiltration.
Details