Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12731

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-06-10 21:59:57 bleepingcomputer MISCELLANEOUS Apple Unveils 'Apple Intelligence' with Privacy-Focused AI
Apple introduced its generative AI feature, 'Apple Intelligence,' at the 2024 Worldwide Developer Conference, enhancing user experience across its devices. The feature integrates into iOS 18, iPadOS 18, and macOS Sequoia, offering personalized AI capabilities using data from the device like emails and images. 'Apple Intelligence' facilitates on-device processing for improved privacy, storing data semantically and enabling AI-generated content and data retrieval via human language queries. Privacy is a key component, with most processing done locally and complex queries handled by 'Private Cloud Compute' servers that ensure data is not stored or accessible by Apple employees. The AI feature is limited to newer hardware such as the iPhone 15 Pro and devices with M1 chips or later, maintaining high performance and security standards. Apple partners with OpenAI, allowing Siri to enhance its responses using ChatGPT for complex inquiries, with anonymity protocols for external requests. Despite strong privacy measures, uncertainties remain about the security of the semantic index used for 'Apple Intelligence,' especially considering past malware challenges on macOS and iOS systems.
Details
2024-06-10 21:39:25 bleepingcomputer MALWARE Critical Security Vulnerabilities Found in Netgear WNR614 Router
Researchers at RedFox Security identified six significant vulnerabilities in the Netgear WNR614 N300 router, affecting numerous users. These flaws range from authentication bypasses and weak password policies to plain text storage of passwords and exposure of WPS PINs. Key vulnerabilities include unauthorized administrative access, interception of sensitive data, and potential for network manipulation. The identified router model has reached end-of-life (EoL) status and is no longer supported by Netgear, meaning no fixes will be issued. Despite its discontinuation, the WNR614 remains widely used in home and small business environments due to its previously noted reliability. For users unable to replace their outdated devices immediately, applying specific mitigations to prevent exploitation is highly recommended. Ultimately, users are encouraged to switch to actively supported router models to ensure network security and protect sensitive data.
Details
2024-06-10 17:47:30 bleepingcomputer DATA BREACH Cylance Confirms Data Breach via Third-Party Platform Link
Cylance acknowledged a data breach involving old data sold by a threat actor named Sp1d3r for $750,000 on a hacking forum. The compromised data includes 34,000,000 customer and employee emails and personally identifiable information, originally from 2015 to 2018. This breached data was accessed through a third-party platform and appears to be unrelated to BlackBerry's direct systems or sensitive customer information. Linkage was made to recent Snowflake attacks affecting several firms indicating a widespread campaign exploiting systems without multi-factor authentication. Mandiant's report connects these Snowflake attacks to a financially motivated group known as UNC5537, which used stolen credentials obtained via infostealer malware. Despite the breach, BlackBerry Cylance assured that no current customers or sensitive operations were impacted. Multiple organizations worldwide have been affected by similar breaches due to compromised and reused credentials from as far back as 2020.
Details
2024-06-10 17:01:24 theregister DATA BREACH Christie's Auction House Reports Data Theft Affecting 45K Clients
Christie's confirmed a data breach impacting 45,798 individuals following a cyberattack, disputing the initial claims by RansomHub of over 500,000 affected. The stolen data included names and ID document numbers, with additional details such as birthplace, birth dates, and addresses claimed by the attackers. Christie's has engaged external cybersecurity experts, notified law enforcement, and provided affected clients with one year of credit monitoring services. The cyberattack occurred between May 8 and May 9, 2024, with unauthorized access gained and data copied from Christie's systems. Despite RansomHub's public threats to leak or auction the stolen data, Christie's indicated that there has been no evidence so far of the information being misused. RansomHub's final claim of auctioning the stolen data is suspected to be a facade to cover their inability to monetize the stolen information effectively. The issue became public after RansomHub named and shamed Christie’s on their leak blog, forcing the auction house's response. Christie's maintained they didn’t pay the demanded ransom. The data breach was publicly disclosed shortly before an $840 million auction, underlining significant timing related to Christie's operational activities.
Details
2024-06-10 15:44:14 bleepingcomputer CYBERCRIME London Hospitals Experience Blood Shortages After Ransomware Attack
A ransomware attack by the Russian cybercrime group Qilin disrupted multiple NHS hospitals in London on June 4, impacting their blood transfusion services. England's NHS Blood and Transplant (NHSBT) has issued an urgent appeal for O Positive and O Negative blood donors following the cybersecurity incident. The attack on the pathology provider Synnovis has jeopardized the ability of hospitals to match blood donor and recipient types, increasing the risk of transfusion mismatches. Due to the compromised system, hospitals are now relying on O Negative and O Positive blood types, which can be safely transfused to the majority of patients. This reliance has led to a significant depletion in reserves of these blood types, as they are being used more frequently to ensure patient safety during surgeries and procedures. Synnovis has not provided any updates since the attack, and recovery efforts are ongoing with no clear timeline for the restoration of normal operations. The NHSBT emphasizes the need for continual replenishment of blood stocks, especially the O blood types, to maintain safe and functional healthcare services amidst the crisis.
Details
2024-06-10 15:33:47 thehackernews MALWARE More_eggs Malware Phishing Scam Targets Industrial Recruiters
A phishing attack distributing More_eggs malware targeted an industrial services company's recruiter, disguised as a resume. The malware, linked to the group Golden Chickens (Venom Spider), functions as a Malware-as-a-Service (MaaS), designed to harvest sensitive information. The attack involved fake LinkedIn job applications that directed recruiters to a harmful download site, masking the payload as a resume. The malware deploys a malicious Windows Shortcut file to execute a DLL using legitimate Windows programs, establishing persistence and extracting data. After the initial setup, additional payloads, including the More_eggs backdoor, are deployed to further compromise the system. The cybersecurity firm eSentire identified the operation managers of this attack in the previous year, enhancing the understanding of the threat landscape. Similar social engineering tactics have been observed in other phishing campaigns, including fake sites for legitimate tools targeting broad user bases. Insight into the ongoing phishing efforts underscores the need for heightened security awareness and robust defenses against such socially engineered attacks.
Details
2024-06-10 15:08:00 bleepingcomputer CYBERCRIME Critical Authentication Bypass Flaw in Veeam, Immediate Patch Required
A public proof-of-concept exploit targets a critical vulnerability in Veeam Backup Enterprise Manager (CVE-2024-29849). The flaw allows unauthenticated remote attackers to log in as any user via the web interface. The exploit leverages a specially crafted SSO token sent to an insecure REST API service, which fails to verify the token’s source. Attackers can gain administrative access by manipulating XML response validation via a rogue server. Veeam has urgently recommended upgrading to VBEM version 12.1.2.172 to mitigate the flaw and provided interim mitigation tips. No actual exploitation of this vulnerability has been detected in the wild yet, but the availability of the PoC greatly increases the risk. Immediate action by administrators is crucial to prevent potential unauthorized access and control over Veeam managed backup systems.
Details
2024-06-10 15:02:29 bleepingcomputer DATA BREACH Joint UK-Canada Investigation into 23andMe Data Breach
Privacy authorities in Canada and the UK are investigating the 23andMe data breach to determine the extent of exposure of sensitive customer information. The investigation focuses on whether 23andMe had adequate security measures to protect customer data and complied with notification obligations under privacy laws. The breach involved attackers using stolen credentials in a five-month long credential-stuffing attack, affecting millions of customers. Compromised data included health reports, raw genotype data, and personal attributes, with some information leaked on online platforms. 23andMe has since implemented mandatory password resets and enabled two-factor authentication for all users to enhance security. Health and genetic data of millions, including specific demographic groups, were notably affected, raising significant privacy concerns. Following the breach and subsequent customer impacts, 23andMe faces multiple lawsuits and has updated its Terms of Use to limit class action participation. The breach highlights the growing need for robust cybersecurity measures and thorough compliance with global data protection regulations in handling sensitive personal data.
Details
2024-06-10 14:05:41 bleepingcomputer CYBERCRIME AI SPERA Launches Cyber Threat Detection on Snowflake Marketplace
AI SPERA has introduced paid cyber threat intelligence data from its Criminal IP search engine on the Snowflake Marketplace, enhancing cybersecurity capabilities. Criminal IP's intelligence offerings include detailed datasets for fraud detection, privacy protection, and incident response, sourced from its comprehensive Cyber Threat Intelligence Database (CTIDB). The data products are designed to identify and mitigate fraudulent activities and privacy breaches by analyzing malicious and masked IP addresses. The newly listed products empower organizations to proactively manage and respond to cybersecurity threats, protecting digital assets and streamlining incident response. Features include advanced detection capabilities for botnets, command and control (C2) software, and anonymizing services like VPNs and proxies. Snowflake Marketplace users can access a complimentary trial, with a subscription option for continuous daily updates. AI SPERA has expanded globally since 2023, forming alliances with top security brands and offering additional cybersecurity services on AWS and Azure Marketplaces.
Details
2024-06-10 12:32:59 theregister DATA BREACH Snowflake Implements MFA After Security Breach Spree
Snowflake, a cloud data analytics firm, has decided to mandate multi-factor authentication (MFA) for its customers following security breaches involving the theft of extensive data from multiple customers including Ticketmaster and Santander. The breaches were initially identified by Hudson Rock analysts, prompting Snowflake to consider stronger security measures despite denying that the breaches stemmed from direct attacks on its own systems. Snowflake is also developing additional advanced security controls for customer accounts to prevent further incidents. There were reports of widespread availability of Snowflake customer credentials on cybercriminal forums, indicating a potentially more extensive problem. Snowflake has been communicating with clients, urging the activation of MFA and other security protocols as essential steps to safeguard their data. The U.S. White House is concurrently being urged by the industry to streamline cybersecurity regulations to enhance both cybersecurity outcomes and business competitiveness. Other related news mentioned includes vulnerabilities in the OT sector and attacks on container environments due to misconfigurations, emphasizing the need for continuous cyber threat assessments and stringent security measures within organizations.
Details
2024-06-10 12:02:06 thehackernews CYBERCRIME Microsoft Warns of Azure Service Tag Vulnerabilities
Microsoft has alerted users to potential misuse of Azure Service Tags for bypassing firewall rules and unauthorized access to cloud resources. The vulnerability was highlighted by cybersecurity firm Tenable, which pointed out that Azure Service Tags could be exploited to impersonate trusted services. At least 10 Azure services, including Azure Application Insights, Azure DevOps, and Azure Machine Learning, have been identified as susceptible to this security flaw. Azure Service Tags are intended for routing network traffic but are not designed to act as a security boundary or replace input validation. Microsoft has revised its documentation advising Azure users that Service Tags alone are insufficient for securing traffic and emphasized the need for additional authentication and validation controls. Despite the vulnerability, there is no current evidence that the feature has been exploited in active attacks. Microsoft has recommended Azure customers to review their use of service tags and reinforce network traffic defenses to authenticate only trusted services.
Details
2024-06-10 11:46:33 thehackernews NATION STATE ACTIVITY Google and Meta Disrupt Global Influence Operations
Google removed 1,320 YouTube channels and 1,177 Blogger blogs linked to a China-based fake information campaign concerning U.S. and China foreign relations. Additional influence operations with connections to Indonesia and Russia were dismantled by Google, involving the termination of advertising accounts and content praising local governments or denigrating rivals. A separate network from the Philippines and India engaging in financially-motivated influence operations was also taken down by Google. Meta disrupted an operation by an Israeli marketing firm intended to influence U.S. and Canadian perspectives on Israel, amidst the Israel-Hamas conflict. Israel's Ministry of Diaspora Affairs was reported to have funded the covert Israeli influence operations, a campaign found out amid ongoing disinformation issues. Microsoft has warned of Russian disinformation efforts targeting the 2024 Summer Olympics in France, with fabricated threats to undermine public trust in the event. The international tactics observed include utilizing generative AI for spreading misinformation, raising concerns about the evolving complexity of info-ops technology use.
Details
2024-06-10 11:35:43 theregister CYBERCRIME UK Police Arrest Two for SMS Phishing Using Fake Cell Tower
British police arrested two individuals linked to a homebrew phone mast facilitating a large-scale smishing operation. The homemade device, termed a “text message blaster,” bypassed traditional network filters to send fraudulent messages posing as banks or official entities. Thousands of fake SMS messages were sent, deceiving recipients into divulging personal information. The UK network operators have measures like forwarding suspicious messages to a dedicated shortcode 7726, enabling them to tackle similar spam messages. One suspect, Huayong Xu, was formally charged with possessing fraudulent articles, while the other unidentified suspect has been bailed. Ongoing collaboration between City of London Police, network operators, Ofcom, and the NCSC aims to prevent further unauthorized use of such technologies. Police speculate the technology used may be akin to an IMSI catcher, which can undermine network security protocols to send unsolicited texts. Enhanced network security measures have been adopted by operators such as EE to prevent the spread of scam messages.
Details
2024-06-10 11:35:43 thehackernews MISCELLANEOUS The Critical Role of Continuing Education in Cybersecurity
Continuing Professional Education (CPE) credits are essential for cybersecurity professionals to maintain and enhance their industry knowledge and skills. CPE activities include attending workshops, online courses, and conferences, focused on updating professionals about the latest cybersecurity threats and defenses. Certifications from bodies like (ISC)², ISACA, and CompTIA require a specific number of CPE credits within set periods to retain credentials. CPEs not only aid in career advancement but also significantly boost job performance by keeping individuals updated on new hacking techniques and security measures. The process of earning and tracking CPE credits is regulated by certifying bodies that specify the type and amount of activities required. Regular participation in CPE activities strengthens an organization's security posture, reduces risks of breaches, and supports professional growth and excellence in the cybersecurity field. The benefits of CPEs extend beyond mere compliance; they are a strategic investment in enhancing an individual's and an organization's defensive capabilities against evolving cyber threats.
Details
2024-06-10 05:33:35 thehackernews NATION STATE ACTIVITY Sticky Werewolf Widens Cyber Attacks in Russia, Belarus
Cybersecurity researchers have revealed ongoing cyber attacks by a group known as Sticky Werewolf, targeting organizations in Russia and Belarus. Targets include a pharmaceutical company, a Russian microbiology research institute, and the aviation sector, expanding Sticky Werewolf's focus from previous governmental targets. The recent phishing campaigns utilize RAR archives with malicious LNK files which, upon extraction and execution, deploy malware bypassing security measures. The malware delivered includes commodity Remote Access Trojans (RATs) and information stealers like Rhadamanthys and Ozone RAT, exploiting the CypherIT crypter variant. Sticky Werewolf's exact national affiliation remains uncertain, though some indicators suggest potential ties to pro-Ukrainian groups or cyber-activists. Other related cyber activities in Russia include the discovery of attack clusters such as Sapphire Werewolf and Fluffy Wolf, targeting various sectors with different malicious software. These revelations highlight the escalating cyberespionage activities amidst geopolitical tensions, underscoring the need for enhanced cybersecurity vigilance in the involved regions.
Details