Daily Cyber News – September 24, 2025

Here’s your Daily Brief, tailored for leaders, practitioners, and busy teams. We cut through noise and focus on what changes risk today. You will hear breaches with real-world fallout, identity flaws with cloud-scale blast radius, and supply-chain shifts that force workflow changes. We will also cover record DDoS pressure and a federal incident that shows how quickly patch notes become intrusions. Expect plain language. Short sentences. Clear actions. If an identifier matters, we will read it slowly. You can listen on the go at d c n dot bare metal cyber dot com. Let’s get into it.

GitHub is tightening npm security after multiple supply-chain incidents. The platform will require two-factor authentication for local publishing. Tokens will become granular and short-lived. Trusted publishing from C I slash C D with Open I D Connect is encouraged. The goal is reducing stolen secrets, wormable scripts, and mass package abuse. What changes for you. Maintainers must enable two-factor authentication and update publishing workflows. Replace long-lived personal access tokens with ephemeral credentials. Enterprises should pin critical dependencies and monitor for typosquats. Add provenance checks and lockfiles to builds. Audit automation that silently publishes. Expect friction during migration. The long-term benefit is fewer ecosystem-wide incidents and faster containment. Communicate the timeline to developers and S R E teams now, so builds do not fail unexpectedly.

A campaign dubbed Operation Rewrite is spreading malware through search engine optimization poisoning. The payload is called BadIIS, and it targets Microsoft Internet Information Services web servers. Visitors drawn in by manipulated search results are redirected, with attackers planting web shells for persistence. Researchers have linked the infrastructure to clusters operating in East and Southeast Asia, especially Vietnam. SEO poisoning is effective because it exploits user trust in search results and compromises legitimate websites. Web administrators should harden content management systems, monitor rewrite rules, and scan for unknown IIS modules. Defenders can also look for unusual referral traffic patterns that suggest SEO manipulation.

Privacy researchers revealed that the Department of Homeland Security has been collecting DNA from U.S. citizens, including minors, and storing it in the FBI’s CODIS database. The program expanded quietly between 2020 and 2024, originally framed as targeting non-citizens but later encompassing Americans without congressional approval. Nearly two thousand citizens’ profiles were gathered during that period. The disclosure raises civil liberties concerns and could fuel legal challenges and policy reviews. For those in data governance, it illustrates how biometric collection and storage can expand without clear oversight. Travelers and advocacy groups may begin pushing for transparency around how genetic data is collected, stored, and shared with partner agencies.

European law enforcement arrested five people tied to a cryptocurrency investment fraud worth more than one hundred million euros. The scam operated across twenty-three countries, luring victims in France, Germany, Italy, and Spain with promises of returns through online platforms. Eurojust coordinated the action, which included freezing bank accounts and seizing assets across multiple jurisdictions. These kinds of investment frauds blend social engineering with the opacity of cryptocurrency transfers, making recovery difficult. Financial institutions should monitor for mule accounts and repeat transfer patterns. Public awareness campaigns also help shorten the window between victim contact and money transfer.

Daily Cyber News – September 24, 2025
Broadcast by