Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11759

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-10-17 15:40:26 theregister DATA BREACH Prosper Data Breach Potentially Affects 17.6 Million Users
Have I Been Pwned reports a data breach at Prosper affecting 17.6 million individuals, though Prosper has yet to verify this figure. The breach reportedly involves email addresses and other personal information, but customer accounts and funds remain secure. Prosper's investigation is ongoing; the company has confirmed the breach involved sensitive data, including Social Security numbers. The San Francisco-based lender has contained the unauthorized access as of September 2, but the breach's initial timeline is unclear. Prosper is offering free credit monitoring to affected individuals and pledges to enhance its security measures following the incident. The breach is among the largest this year, though it does not rank among the biggest breaches historically. Prosper is cooperating with law enforcement and prioritizes transparency with customers as the investigation progresses.
Details
2025-10-17 15:40:25 bleepingcomputer VULNERABILITIES Microsoft Patches Critical ASP.NET Core HTTP Request Smuggling Flaw
Microsoft addressed a critical vulnerability (CVE-2025-55315) in the Kestrel ASP.NET Core web server, marked with the highest severity rating for an ASP.NET Core flaw. The flaw allows authenticated attackers to smuggle HTTP requests, potentially hijacking user credentials and bypassing front-end security measures. Successful exploitation could lead to unauthorized access, privilege escalation, server-side request forgery, and bypassing cross-site request forgery checks. Microsoft released security updates for Visual Studio 2022, ASP.NET Core 2.3, 8.0, 9.0, and the Kestrel Core package to mitigate the vulnerability. The impact of the vulnerability varies based on the targeted application, with the worst-case scenario being a security feature bypass. During this month's Patch Tuesday, Microsoft released updates for 172 vulnerabilities, including eight critical and six zero-day flaws. Organizations are urged to apply the updates promptly to protect against potential exploitation and maintain application security.
Details
2025-10-17 14:02:33 bleepingcomputer MISCELLANEOUS VMware Certification Elevates IT Professionals' Skills and Career Trajectories
VMware certifications are designed to enhance IT professionals' skills, enabling them to master complex systems and build secure, reliable infrastructures. The VMUG Advantage program provides resources for hands-on practice, mentorship, and cost savings, accelerating the certification journey. According to a Pearson VUE report, 63% of certified professionals have received or anticipate job promotions, while 82% feel more confident pursuing new opportunities. Certification fosters a culture of innovation and empowerment within teams, leading to faster communication and improved talent retention. VMUG leaders emphasize that certification transforms IT professionals from reactive operators to proactive strategists, enhancing their problem-solving and leadership capabilities. The program supports both individual career growth and organizational capability development through scalable training solutions and group licensing options. As the IT landscape evolves with hybrid clouds and AI-driven security, VMware certification serves as a critical anchor for maintaining expertise and relevance.
Details
2025-10-17 13:38:54 thehackernews NATION STATE ACTIVITY North Korean Hackers Enhance Malware with Blockchain-Based C2 Techniques
Cisco Talos reports North Korean hackers merging BeaverTail and OtterCookie malware, enhancing capabilities with keylogging and screenshot features, indicating an evolving threat landscape. The group, linked to the Contagious Interview campaign, uses decentralized blockchain infrastructure for command-and-control, marking a first for nation-state actors. The campaign targets job seekers through fake recruitment scams, leading to the installation of information-stealing malware under the guise of technical assessments. A Sri Lankan organization was inadvertently impacted, with malware distributed via a trojanized Node.js application hosted on Bitbucket. Malicious npm package "node-nvm-ssh" was downloaded 306 times before removal, part of a broader campaign involving 338 flagged Node libraries. The malware's new version, OtterCookie v5, includes features for data theft, remote command execution, and persistent access via AnyDesk installation. Researchers noted the use of legitimate npm packages for malicious purposes, raising concerns over software supply chain vulnerabilities. The discovery of a Visual Studio Code extension containing malware code suggests potential experimentation with new delivery methods.
Details
2025-10-17 13:13:44 theregister MISCELLANEOUS Legal Challenge Against U.S. Social Media Surveillance Program Intensifies
The Electronic Frontier Foundation (EFF) is supporting a lawsuit against the Trump administration's social media surveillance program, citing First Amendment violations affecting both citizens and noncitizens. The program, known as "Catch and Revoke," involves AI monitoring of visa holders' social media for anti-American views, potentially leading to visa revocations. A federal court ruled the executive orders initiating these measures unconstitutional, temporarily halting deportations based on protected speech, though an appeal is expected. The lawsuit claims that the surveillance program has led to self-censorship among union members, with many deleting social media content or altering online behavior. The program's impact extends to offline activities, with union members reportedly reducing participation in rallies and other public demonstrations due to fear of repercussions. The State Department defends the program, stating it targets individuals expressing harmful sentiments against Americans, emphasizing national security concerns. The case highlights ongoing tensions between national security measures and civil liberties, with implications for how social media data is used in immigration enforcement.
Details
2025-10-17 12:38:38 theregister NATION STATE ACTIVITY Dutch Sanctions on Nexperia Threaten Global Automotive Chip Supply
The Dutch government's sanctions on Nexperia, a Chinese-owned chipmaker, could lead to a significant shortage of automotive chips, impacting major car manufacturers globally. Nexperia, a key supplier for automotive electronic control units, faces export restrictions from China's Ministry of Commerce, affecting its ability to ship components internationally. The European Automobile Manufacturers' Association and the Alliance for Automotive Innovation have raised concerns over potential disruptions in vehicle production due to chip shortages. China's export control is a response to the Netherlands' governance-related measures against Nexperia, including suspending its Chinese CEO and restricting asset relocation. Nexperia is actively negotiating with Chinese authorities for an exemption from export restrictions and is engaging with government bodies to mitigate the impact. The situation is exacerbated by US pressure on the Netherlands to separate Nexperia's European operations from its Chinese parent company, Wingtech Technology. The automotive industry, still recovering from past chip shortages, warns of potential production stoppages if the issue isn't resolved swiftly. The incident underscores the complex geopolitical dynamics affecting global supply chains and the need for resilient strategies in critical industries.
Details
2025-10-17 12:16:41 bleepingcomputer VULNERABILITIES F5 BIG-IP Vulnerabilities Expose Over 266,000 Instances to Remote Attacks
Shadowserver Foundation identified over 266,000 F5 BIG-IP instances exposed online following a security breach involving nation-state hackers, potentially linked to China. F5 disclosed the breach, revealing source code theft and information on undisclosed BIG-IP vulnerabilities, though no exploitation evidence has been found. F5 promptly issued patches for 44 vulnerabilities and urged customers to update their systems, including BIG-IP, F5OS, and other related products. CISA mandated U.S. federal agencies to secure F5 products by October 22, with further deadlines for other devices, emphasizing the urgency of patching. The attack involved the Brickstorm malware, a Go-based backdoor associated with the UNC5291 threat group, active in F5's network for at least a year. F5's products are critical to over 23,000 customers globally, including 48 of the Fortune 50, highlighting the potential widespread impact of these vulnerabilities. The incident underscores the need for robust patch management and threat-hunting practices to mitigate risks associated with exposed network devices.
Details
2025-10-17 11:01:24 thehackernews MISCELLANEOUS Identity Security Emerges as Core Defense in AI-Driven Era
The rise of autonomous AI agents with significant system privileges introduces new security risks, demanding a shift in focus towards robust identity management. Traditional security models centered on firewalls and endpoint protection are outdated, as identity management becomes the primary control point in modern cybersecurity. The 2025-2026 SailPoint Horizons of Identity Security report indicates that less than 40% of AI agents are governed by identity security policies, exposing enterprises to heightened risks. Organizations with advanced identity security programs achieve higher ROI, leveraging identity management to prevent breaches and enhance operational efficiency. A significant gap exists between organizations with mature identity security practices and those lagging, increasing vulnerability to sophisticated threats. The report highlights that only 25% of organizations view Identity and Access Management (IAM) as a strategic enabler, limiting potential for transformation and risk mitigation. As AI-driven capabilities expand, enterprises must reassess their identity security posture to ensure readiness against evolving threat landscapes.
Details
2025-10-17 09:32:22 thehackernews VULNERABILITIES Critical WatchGuard VPN Flaw Enables Remote Code Execution Risks
Researchers identified a critical vulnerability in WatchGuard Fireware OS, tracked as CVE-2025-9242, allowing unauthenticated attackers to execute arbitrary code on affected devices. The flaw affects Fireware OS versions 11.10.2 to 11.12.4_Update1, 12.0 to 12.11.3, and 2025.1, impacting both mobile user and branch office VPNs with IKEv2. Exploitation involves an out-of-bounds write in the iked process, potentially enabling attackers to gain control of the instruction pointer register and spawn a Python shell. WatchGuard has released patches to address the vulnerability, urging users to update to secure versions to prevent potential exploitation by ransomware groups. The vulnerability's characteristics, such as internet exposure and lack of authentication, make it attractive for malicious actors seeking remote code execution capabilities. This discovery follows recent disclosures of other critical vulnerabilities, including those in Progress Telerik UI and Dell UnityVSA, emphasizing the need for timely patch management. Organizations using affected WatchGuard devices should prioritize patching and review their VPN configurations to mitigate potential security risks.
Details
2025-10-17 06:08:13 thehackernews CYBERCRIME Microsoft Revokes 200 Fraudulent Certificates in Ransomware Crackdown
Microsoft has revoked over 200 certificates used by the Vanilla Tempest group to sign malicious binaries in a ransomware campaign involving Rhysida. These certificates were used in fake Microsoft Teams setup files to deliver the Oyster backdoor, ultimately deploying Rhysida ransomware. The campaign was detected in late September 2025, and Microsoft disrupted the activity earlier this month, updating security solutions to flag related threats. Vanilla Tempest, also known as Vice Society, has been active since July 2022, using various ransomware strains including BlackCat and Quantum Locker. The group used SEO poisoning to direct users to malicious domains mimicking Microsoft Teams download sites, exploiting user trust in search results. Trusted Signing and major code signing services like DigiCert and GlobalSign were used to sign the malicious installers and tools. Users are advised to download software only from verified sources to mitigate the risk of such attacks and avoid suspicious links in search engine ads.
Details
2025-10-17 05:59:36 bleepingcomputer DATA BREACH Sotheby’s Data Breach Exposes Sensitive Employee Financial Information
Sotheby’s, a prominent international auction house, experienced a data breach involving unauthorized access to sensitive employee information, including Social Security numbers and financial account details. The breach was detected on July 24, 2025, prompting a two-month investigation to determine the scope and specific data affected. The company handles billions in auction sales annually, emphasizing the potential impact on its operations and reputation. The breach notification indicated that two individuals in Maine and two in Rhode Island were affected, with the total number of impacted employees undisclosed. No ransomware groups have claimed responsibility for the breach, although similar entities have targeted auction houses previously. Sotheby’s is offering affected employees 12 months of free identity protection and credit monitoring services through TransUnion. The company has engaged data protection experts and law enforcement to manage the incident and mitigate future risks.
Details
2025-10-16 19:52:20 theregister VULNERABILITIES Experts Call for Overhaul of CVE and CVSS Systems
Aram Hovespyan, CEO of Codific, critiques the CVE and CVSS systems, citing misaligned incentives and inconsistency in vulnerability assessments. Research presented at the USENIX Security Symposium indicates 34% of CVEs cited in academic papers are either unconfirmed or disputed by software maintainers. The CVE process involves multiple stakeholders, including CNAs, which may lack motivation or technical context, leading to questionable vulnerability reports. The CVSS system's scoring inconsistency is highlighted, with studies showing significant score variations upon re-evaluation, questioning its reliability. An example of a deprecated system receiving a high CVSS score before being downgraded illustrates potential flaws in the current vulnerability assessment process. Industry experts suggest CVEs and CVSS should not be the sole foundation of application security strategies, advocating for risk assessment grounded in threat modeling. Calls for procedural improvements in vulnerability reporting emphasize the need for a scientific approach to interpreting vulnerability data.
Details
2025-10-16 19:30:32 bleepingcomputer DATA BREACH Sotheby’s Data Breach Exposes Sensitive Customer Financial Information
Sotheby’s, a premier global auction house, reported a data breach affecting customer information, including financial details, detected on July 24, 2025. The breach involved unauthorized access to sensitive data such as full names, Social Security numbers, and financial account information. The investigation into the breach spanned two months to ascertain the scope and specifics of the data compromised. While the total number of affected individuals remains undisclosed, at least four individuals in Maine and Rhode Island were impacted. No ransomware group has claimed responsibility for the attack, although similar organizations have targeted auction houses previously. Sotheby’s has offered a 12-month free identity protection and credit monitoring service to affected customers through TransUnion. Past security incidents at Sotheby’s include a web skimmer attack in 2017-2018 and a supply-chain attack in 2021, highlighting ongoing security challenges.
Details
2025-10-16 19:24:07 bleepingcomputer DATA BREACH Prosper Data Breach Exposes Information of 17.6 Million Accounts
Financial services firm Prosper experienced a data breach affecting over 17.6 million accounts, with attackers accessing sensitive customer and applicant information. The breach was detected on September 2, but Prosper has not found evidence of unauthorized access to customer accounts or funds. Exposed data includes Social Security numbers, names, government-issued IDs, employment and credit status, income levels, and other personal details. Prosper has reported the incident to authorities and is collaborating with law enforcement to investigate the breach. The company is offering free credit monitoring to affected individuals once the full scope of compromised data is determined. Although Prosper has not confirmed the extent of the breach, the notification service Have I Been Pwned disclosed the impact on 17.6 million email addresses. Prosper's customer-facing operations remain unaffected, and the company prioritizes resolving the incident while keeping customers informed.
Details
2025-10-16 18:17:59 bleepingcomputer VULNERABILITIES Hackers Exploit Cisco SNMP Flaw, Deploy Rootkit on Switches
Threat actors exploited a remote code execution vulnerability (CVE-2025-20352) in Cisco devices, targeting older models like the 9400, 9300, and 3750G series lacking endpoint detection solutions. The vulnerability affects the Simple Network Management Protocol (SNMP) in Cisco IOS and IOS XE, allowing attackers with root privileges to deploy a Linux rootkit for persistent access. Trend Micro identified this campaign as 'Operation Zero Disco', noting the malware sets a universal access password and can manipulate logs and bypass access controls. The rootkit includes a UDP controller to listen on any port, disabling logs, and enabling lateral movement across VLANs through ARP spoofing and internal firewall rule bypassing. Despite newer switches having Address Space Layout Randomization (ASLR) protection, they remain susceptible to persistent targeting, emphasizing the need for robust security measures. Trend Micro recommends a low-level firmware and ROM region investigation if a compromise is suspected, as no reliable detection tool currently exists for these attacks. Indicators of compromise (IoCs) related to 'Operation Zero Disco' have been published to aid in identifying affected systems.
Details