Rob Joyce explains how it’s done Video In 2018, Rob Joyce, then Donald Trump’s White House Cybersecurity Coordinator, gave a surprise talk at the legendary hacking conference Shmoocon about his hobby.… This article has been indexed from The Register –…
Tag: The Register – Security
How Androxgh0st rose from Mozi’s ashes to become ‘most prevalent malware’
Botnet’s operators ‘driven by similar interests as that of the Chinese state’ After the Mozi botnet mysteriously disappeared last year, a new and seemingly more powerful botnet, Androxgh0st, rose from its ashes and has quickly become a major threat to…
What do ransomware and Jesus have in common? A birth month and an unwillingness to die
35 years since AIDS first borked a PC and we’re still no closer to a solution Feature Your Christmas holidays looked quite different in the ’80s to how they do today. While some will remember what it was like to…
One third of adults can’t delete device data
Easier to let those old phones gather dust in a draw, survey finds The UK’s Information Commissioner’s Office (ICO) has warned that many adults don’t know how to wipe their old devices, and a worrying number of young people just…
‘That’s not a bug, it’s a feature’ takes on a darker tone when malware’s involved
Mummy, where do zero days come from? Opinion One of the charms of coding is that malice can be indistinguishable from incompetence. Last week’s Who, Me? story about financial transfer test software running amok is a case in point.… This…
Suspected LockBit dev, facing US extradition, ‘did it for the money’
Dual Russian-Israeli national arrested in August An alleged LockBit ransomware developer is in custody in Israel and awaiting extradition to the United States.… This article has been indexed from The Register – Security Read the original article: Suspected LockBit dev,…
UK ICO not happy with Google’s plans to allow device fingerprinting
Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more in brief Google has announced plans to allow its business customers to begin “fingerprinting” users next year, and the UK Information Commissioner’s Office (ICO) isn’t…
Infosec experts divided on AI’s potential to assist red teams
Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence CANALYS FORUMS APAC Generative AI is being enthusiastically adopted in almost every field, but infosec experts are divided on whether it is truly helpful for…
Don’t fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish
Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns Unknown criminals went on a phishing expedition that targeted about 20,000 users across the automotive, chemical and industrial compound manufacturing sectors in Europe, and tried…
US reportedly mulls TP-Link router ban over national security risk
It could end up like Huawei -Trump’s gonna get ya, get ya, get ya The Feds may ban the sale of TP-Link routers in the US over ongoing national security concerns about Chinese-made devices being used in cyberattacks.… This article…
Microsoft won’t let customers opt out of passkey push
Enrolment invitations will continue until security improves Microsoft last week lauded the success of its efforts to convince customers to use passkeys instead of passwords, without actually quantifying that success.… This article has been indexed from The Register – Security…
Boffins trick AI model into giving up its secrets
All it took to make an Google Edge TPU give up model hyperparameters was specific hardware, a novel attack technique … and several days Computer scientists from North Carolina State University have devised a way to copy AI models running…
Phishers cast wide net with spoofed Google Calendar invites
Not that you needed another reason to enable the ‘known senders’ setting Criminals are spoofing Google Calendar emails in a financially motivated phishing expedition that has already affected about 300 organizations with more than 4,000 emails sent over four weeks,…
Interpol wants everyone to stop saying ‘pig butchering’
Victim’s feelings might get hurt, global cops contend, and that could hinder reporting Interpol wants to put an end to the online scam known as “pig butchering” through linguistic policing rather than law enforcement.… This article has been indexed from…
Critical security hole in Apache Struts under exploit
You applied the patch that could stop possible RCE attacks last week, right? A critical security hole in Apache Struts 2, patched last week, is now being exploited using publicly available proof-of-concept (PoC) code.… This article has been indexed from…
Ireland fines Meta for 2018 ‘View As’ breach that exposed 30M accounts
€251 million? Zuck can find that in his couch cushions, but Meta still vows to appeal It’s been six years since miscreants abused some sloppy Facebook code to steal access tokens belonging to 30 million users, and the slow-turning wheels…
BlackBerry offloads Cylance’s endpoint security products to Arctic Wolf
Fresh attempt to mix the perfect cocktail of IoT and Infosec BlackBerry’s ambition to mix infosec and the Internet of Things has been squeezed, after the Canadian firm announced it is offloading Cylance’s endpoint security products.… This article has been…
Australia moves to drop some cryptography by 2030 – before quantum carves it up
The likes of SHA-256, RSA, ECDSA and ECDH won’t be welcome in just five years Australia’s chief cyber security agency has decided local orgs should stop using the tech that forms the current cryptographic foundation of the internet by the…
Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility
But can you really take crims at their word? Supply chain integration vendor Cleo has urged its customers to upgrade three of its products after an October security update was circumvented, leading to widespread ransomware attacks that Russia-linked gang Cl0p…
Trump administration wants to go on cyber offensive against China
The US has never attacked Chinese critical infrastructure before, right? President-elect Donald Trump’s team wants to go on the offensive against America’s cyber adversaries, though it isn’t clear how the incoming administration plans to achieve this. … This article has been…
Deloitte says cyberattack on Rhode Island benefits portal carries ‘major security threat’
Personal and financial data probably stolen A cyberattack on a Deloitte-managed government system in Rhode Island carries a “high probability” of sensitive data theft, the state says.… This article has been indexed from The Register – Security Read the original…
Are your Prometheus servers and exporters secure? Probably not
Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more Infosec in brief There’s a problem of titanic proportions brewing for users of the Prometheus open source monitoring toolkit: hundreds of thousands of servers and exporters are exposed to…
Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks
IOCONTROL targets IoT and OT devices from a ton of makers, apparently An Iranian government-linked cybercriminal crew used custom malware called IOCONTROL to attack and remotely control US and Israel-based water and fuel management systems, according to security researchers.… This…
Scumbag gets 30 years in the clink for running CSAM dark-web chatrooms, abusing kids
‘Today’s sentencing is more than just a punishment. It’s a message’ A Texan who ran a forum on the dark web where depraved netizens could swap child sex abuse material (CSAM), and chat freely about abusing kids, has been sentenced…
Google Timeline location purge causes collateral damage
Privacy measure leaves some mourning lost memories A year ago, Google announced plans to save people’s Location History, which it now calls Timeline, locally on devices rather than on its servers.… This article has been indexed from The Register –…
Cyber protection made intuitive and affordable
How Cynet delivered 100 percent Protection and 100 percent Detection Visibility in 2024 MITRE ATT&CK Evaluation Partner Content Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and…
Taming the multi-vault beast
GitGuardian takes on enterprise secrets sprawl Partner Content With Non-Human Identities (NHIs) now outnumbering human users 100 to one in enterprise environments, managing secrets across multiple vaults has become a significant security concern.… This article has been indexed from The…
North Korea’s fake IT worker scam hauled in at least $88 million over six years
DoJ thinks it’s found the folks that ran it, and some of the ‘IT warriors’ sent out to fleece employers North Korea’s fake IT worker scams netted the hermit kingdom $88 million over six years, according to the US Department…
Apache issues patches for critical Struts 2 RCE bug
More details released after devs allowed weeks to apply fixes We now know the remote code execution vulnerability in Apache Struts 2 disclosed back in November carries a near-maximum severity rating following the publication of the CVE.… This article has…
Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push
Holiday cheer comes in the form of three arrests and 27 shuttered domains The Europol-coordinated Operation PowerOFF struck again this week as cross-border cops pulled the plug on 27 more domains tied to distributed denial of service (DDoS) criminality.… This…
British Army zaps drones out of the sky with laser trucks
High-energy weapon proves its mettle in testing The British Army has successfully destroyed flying drones for the first time using a high-energy laser mounted on an armored vehicle. If perfected, the technology could form an effective counter-measure against drone attacks.… This article…
Firefox ditches Do Not Track because nobody was listening anyway
Few websites actually respect the option, says Mozilla When Firefox 135 is released in February, it’ll ship with one less feature: Mozilla plans to remove the Do Not Track toggle from its Privacy and Security settings. … This article has been…
Citrix goes shopping in Europe and returns with gifts for security-conscious customers
Acquires two companies that offer stuff for those on the nice list to keep naughty list types at bay Citrix has gone on a European shopping trip, and come home with its bag of gifts bulging thanks to a pair…
Blocking Chinese spies from intercepting calls? There ought to be a law
Sen. Wyden blasts FCC’s ‘failure’ amid Salt Typhoon hacks US telecoms carriers would be required to implement minimum cyber security standards and ensure their systems are not susceptible to hacks by nation-state attackers – like Salt Typhoon – under legislation…
Krispy Kreme Doughnut Corporation admits to hole in security
Belly-busting biz says it’s been hit by cowardly custards Doughnut slinger Krispy Kreme has admitted to an attack that has left many customers unable to order online.… This article has been indexed from The Register – Security Read the original…
Three more vulns spotted in Ivanti CSA, all critical, one 10/10
Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker Ivanti just put out a security advisory warning of three critical vulnerabilities in its Cloud Services Application (CSA), including a perfect 10.… This article has been…
US names Chinese national it alleges was behind 2020 attack on Sophos firewalls
Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware The US Departments of Treasury and Justice have named a Chinese business and one of its employees as the actors behind the 2020 exploit of a…
Microsoft holds last Patch Tuesday of the year with 72 gifts for admins
Twas the night before Christmas, and all through the house, patching was done with the click of a mouse Microsoft hasn’t added too much coal to the stocking this Patch Tuesday, with just 72 fixes, only one of which scored…
US military grounds entire Osprey tiltrotor fleet over safety concerns
Boeing-Bell V-22 can’t outfly its checkered past, it seems The US Navy, Air Force, and Marine Corps have grounded their fleet of Boeing-Bell-made Osprey V-22s on safety grounds.… This article has been indexed from The Register – Security Read the…
AMD secure VM tech undone by DRAM meddling
Boffins devise BadRAM attack to pilfer secrets from SEV-SNP encrypted memory Researchers have found that the security mechanism AMD uses to protect virtual machine memory can be bypassed with $10 of hardware – and perhaps not even that.… This article…
Fully patched Cleo products under renewed ‘zero-day-ish’ mass attack
Thousands of servers targeted while customers wait for patches Researchers at security shop Huntress are seeing mass exploitation of a vulnerability affecting three Cleo file management products, even on patched systems.… This article has been indexed from The Register –…
Heart surgery device maker’s security bypassed, data encrypted and stolen
Sounds like th-aorta get this sorted quickly A manufacturer of devices used in heart surgeries says it’s dealing with “a cybersecurity incident” that bears all the hallmarks of a ransomware attack.… This article has been indexed from The Register –…
Bitfinex heist gets the Netflix treatment after ‘cringey couple’ sentenced
Streamer’s trademark dramatic style takes on Bitcoin Bonnie and Clyde A documentary examining the 2016 Bitfinex burglars hits Netflix, bringing the curious case to living rooms for the first time.… This article has been indexed from The Register – Security…
WhatsApp finally fixes View Once flaw that allowed theft of supposedly vanishing pics
And it only took four months, tut WhatsApp has fixed a problem with its View Once feature, designed to protect people’s privacy with automatically disappearing pictures and videos.… This article has been indexed from The Register – Security Read the…
Police arrest suspect in murder of UnitedHealthcare CEO, with grainy pics the only tech involved
McDonald’s worker called it in, cops swooped, found ‘gun, suppressor, manifesto’ Police in Pennsylvania have arrested a man suspected of killing the CEO of insurer UnitedHealthcare in New York City, thanks to a McDonald’s employee who recognized the suspect in…
China’s Salt Typhoon recorded top American officials’ calls, says White House
No word yet on who was snooped on. Any bets? Chinese cyberspies recorded “very senior” US political figures’ calls, according to White House security boss Anne Neuberger.… This article has been indexed from The Register – Security Read the original…
Salt Typhoon recorded top US officials’ calls, says White House
No word yet on who. Any bets? Chinese cyberspies recorded “very senior” US political figures’ calls, according to White House security boss Anne Neuberger.… This article has been indexed from The Register – Security Read the original article: Salt Typhoon…
Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket
ShinyHunters-linked heist thought to have been ongoing since March Exclusive A massive online heist targeting AWS customers during which digital crooks abused misconfigurations in public websites and stole source code, thousands of credentials, and other secrets remains “ongoing to this…
OpenWrt orders router firmware updates after supply chain attack scare
A couple of bugs lead to a potentially bad time OpenWrt users should upgrade their images to the same version to protect themselves from a possible supply chain attack reported to the open source Wi-Fi router project last week.… This…
Microsoft dangles $10K for hackers to hijack LLM email service
Outsmart an AI, win a little Christmas cash Microsoft and friends have challenged AI hackers to break a simulated LLM-integrated email client with a prompt injection attack – and the winning teams will share a $10,000 prize pool.… This article…
Blue Yonder ransomware termites claim credit
Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren’t; Polish spy boss arrested, and more Infosec in brief Still smarting over that grocery disruption caused by a ransomware attack on supply chain SaaS vendor Blue…
How Chinese insiders are stealing data scooped up by President Xi’s national surveillance system
‘It’s a double-edged sword,’ security researchers tell The Reg Feature Chinese tech company employees and government workers are siphoning off user data and selling it online – and even high-ranking Chinese Communist Party officials and FBI-wanted hackers’ sensitive information is…
Micropatchers share 1-instruction fix for NTLM hash leak flaw in Windows 7+
Microsoft’s OS sure loves throwing your creds at remote systems Acros Security claims to have found an unpatched bug in Microsoft Windows 7 and onward that can be exploited to steal users’ OS account credentials.… This article has been indexed…
Facing sale or ban, TikTok tossed under national security bus by appeals court
Video slinger looks to Supremes for salvation, though anything could happen under Trump A US federal appeals court has rejected a challenge to the law that prevents popular apps that collect data on Americans from being controlled by a foreign…
Salt Typhoon forces FCC’s hand on making telcos secure their networks
Proposal pushes stricter infosec safeguards after Chinese state baddies expose vulns The head of America’s Federal Communications Commission (FCC) wants to force telecoms operators to tighten network security in the wake of the Salt Typhoon revelations, and to submit an…
Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware
Threatened with life in prison, Kyiv charity worker gives middle finger to state spies A Russian programmer defied the Federal Security Service (FSB) by publicizing the fact his phone was infected with spyware after being confiscated by authorities.… This article…
Protect your clouds
Get best practice advice on how to safeguard your cloud infrastructure from SANS Sponsored Post According to the 2024 IBM Cost of the Data Breach Report 40 percent of data breaches identified between March 2023 and February 2024 involved data…
PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files
Still unpatched 100+ days later, watchTowr says A zero-day arbitrary file read vulnerability in Mitel MiCollab can be chained with a now-patched critical bug in the same platform to give attackers access to sensitive files on vulnerable instances. … This article…
Microsoft: Another Chinese cyberspy crew targeting US critical orgs ‘as of yesterday’
Redmond threat intel maven talks explains this persistent pain to The Reg A Chinese government-linked group that Microsoft tracks as Storm-0227 yesterday started targeting critical infrastructures organisations and US government agencies, according to Redmond’s threat intel team.… This article has…
Solana blockchain’s popular web3.js npm package backdoored to steal keys, funds
Damage likely limited to those running bots with private key access Malware-poisoned versions of the widely used JavaScript library @solana/web3.js were distributed via the npm package registry, according to an advisory issued Wednesday by project maintainer Steven Luscher.… This article…
Explore strategies for effective endpoint control
Discover how automation can simplify endpoint management in this webinar Webinar Managing endpoints in today’s dynamic IT environments is becoming increasingly complex.… This article has been indexed from The Register – Security Read the original article: Explore strategies for effective…
British hospitals hit by cyberattacks still battling to get systems back online
Children’s hospital and cardiac unit say criminals broke in via shared ‘digital gateway service’ Both National Health Service trusts that oversee the various hospitals hit by separate cyberattacks last week have confirmed they’re still in the process of restoring systems.……
BT Group confirms attackers tried to break into Conferencing division
Sensitive data allegedly stolen from US subsidiary following Black Basta post BT Group confirmed it is dealing with an attempted attack on one of its legacy business units after the Black Basta ransomware group claimed they broke in.… This article…
Shape the future of UK cyber security
Support the industry by sponsoring the UK Cyber Team Competition Partner Content The opportunity to identify, foster and nurture talented young people towards a cyber security career should always be grabbed with both hands.… This article has been indexed from…
Ransomware hangover, Putin grudge blamed for vodka maker’s bankruptcy
Stoli Group on the rocks in the US Two US subsidiaries of alcohol giant Stoli Group filed for bankruptcy protection this week over financial difficulties exacerbated by an August ransomware attack.… This article has been indexed from The Register –…
T-Mobile US CSO: Spies jumped from one telco to another in a way ‘I’ve not seen in my career’
Security chief talks to El Reg as Feds urge everyone to use encrypted chat interview While Chinese-government-backed spies maintained access to US telecommunications providers’ networks for months – and in some cases still haven’t been booted out – T-Mobile US…
Cops arrest suspected admin of German-language crime bazaar
Drugs, botnets, forged docs, and more generated fortune for platform sellers German authorities say they have again shut down the perhaps unwisely named Crimenetwork platform and arrested a suspected admin.… This article has been indexed from The Register – Security…
Perfect 10 directory traversal vuln hits SailPoint’s IAM solution
20-year-old info disclosure class bug still pervades security software It’s time to rev up those patch engines after SailPoint disclosed a perfect 10/10 severity vulnerability in its identity and access management (IAM) platform IdentityIQ.… This article has been indexed from…
FTC scolds two data brokers for allegedly selling your location to the metre
‘Where we go is who we are’ totally isn’t a creepy ad slogan at all The FTC has reached a settlement with two data brokerages over allegations they harvested precise location data that shows when people entered hospitals, places of…
Eurocops take down ‘secure’ criminal chat system known as Matrix
They took the red pill Updated French and Dutch police have taken down the Matrix chat app, which was designed by criminals for criminals to be a secure encrypted messaging tool.… This article has been indexed from The Register –…
Microsoft says premature patch could make Windows Recall forget how to work
Installed the final non-security preview update of 2024? Best not hop onto the Dev Channel Microsoft has pinned down why some eager Windows Insiders could not persuade the Recall preview to save any snapshots. It’s all down to a pesky…
Simplifying endpoint security
Discover unified strategies to secure and manage all endpoints across your organization Webinar As organizations expand their digital footprint, the range of endpoints – spanning from laptops to IoT devices – continues to grow.… This article has been indexed from…
Bitfinex burglar bags 5 years behind bars for Bitcoin heist
A nervous wait for rapper wife who also faces a stint in the clink The US is sending the main figure behind the 2016 intrusion at crypto exchange Bitfinex to prison for five years after he stole close to 120,000…
Microsoft Power Pages misconfigurations exposing sensitive data
NHS supplier that leaked employee info fell victim to fiddly access controls that can leave databases dangling online Private businesses and public-sector organizations are unwittingly exposing millions of people’s sensitive information to the public internet because they misconfigure Microsoft’s Power…
Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost
Plus a bonus hard-coded local API key A now-patched, high-severity bug in Fortinet’s FortiClient VPN application potentially allows a low-privilege rogue user or malware on a vulnerable Windows system to gain higher privileges from another user, execute code and possibly…
Cybercriminal devoid of boundaries gets 10-year prison sentence
Serial extortionist of medical facilities stooped to cavernous lows in search of small payouts A rampant cybercrook and repeat attacker of medical facilities in the US is being sentenced to a decade in prison, around seven years after the first…
Kids’ shoemaker Start-Rite trips over security again, spilling customer card info
Full details exposed, putting shoppers at serious risk of fraud Children’s shoemaker Start-Rite is dealing with a nasty “security incident” involving customer payment card details, its second significant lapse during the past eight years.… This article has been indexed from…
NatWest blocks bevy of apps in clampdown on unmonitorable comms
From guidance to firm action… no more WhatsApp, Meta’s Messenger, Signal, Telegram and more The full list of messaging apps officially blocked by Brit banking and insurance giant NatWest Group is more extensive than WhatsApp, Meta’s Messenger, and Skype –…
Asda security chief replaced, retailer sheds jobs during Walmart tech divorce
British grocer’s workers called back to office as clock ticks for contractors The head of tech security at Asda, the UK’s third-largest food retailer, has left amid an ongoing tech divorce from US grocery giant Walmart.… This article has been…
Five Eyes infosec agencies list 2024’s most exploited software flaws
Slack patching remains a problem – which is worrying as crooks increasingly target zero-day vulns The cyber security agencies of the UK, US, Canada, Australia, and New Zealand have issued their annual list of the 15 most exploited vulnerabilities, and…
Reminder: China-backed crews compromised ‘multiple’ US telcos in ‘significant cyber espionage campaign’
Feds don’t name Salt Typhoon, but describe Beijing band’s alleged deeds The US government has confirmed there was “a broad and significant cyber espionage campaign” conducted by China-linked snoops against “multiple” American telecommunications providers’ networks.… This article has been indexed…
China-backed crews compromised ‘multiple’ US telcos in ‘significant cyber espionage campaign’
Feds don’t name Salt Typhoon, but describe Beijing band’s alleged deeds The US government has detected “a broad and significant cyber espionage campaign” conducted by China-linked attackers and directed at “multiple” US telecommunications providers’ networks.… This article has been indexed…
ShrinkLocker ransomware scrambled your files? Free decryption tool to the rescue
Plus: CISA’s ScubaGear dives deep to fix M365 misconfigs Bitdefender has released a free decryption tool that can unlock data encrypted by the ShrinkLocker ransomware.… This article has been indexed from The Register – Security Read the original article: ShrinkLocker…
Data broker amasses 100M+ records on people – then someone snatches, sells it
We call this lead degeneration What’s claimed to be more than 183 million records of people’s contact details and employment info has been stolen or otherwise obtained from a data broker and put up for sale by a miscreant.… This…
Ransomware fiends boast they’ve stolen 1.4TB from US pharmacy network
American Associated Pharmacies yet to officially confirm infection American Associated Pharmacies (AAP) is the latest US healthcare organization to have had its data stolen and encrypted by cyber-crooks, it is feared.… This article has been indexed from The Register –…
Microsoft slips Task Manager and processor count fixes into Patch Tuesday
Sore about cores no more Microsoft has resolved two issues vexing Windows 11 24H2 and Windows Server 2025 users among the many security updates that emerged on Patch Tuesday.… This article has been indexed from The Register – Security Read…
China’s Volt Typhoon crew and its botnet surge back with a vengeance
Ohm, for flux sake China’s Volt Typhoon crew and its botnet are back, compromising old Cisco routers once again to break into critical infrastructure networks and kick off cyberattacks, according to security researchers.… This article has been indexed from The…
Admins can give thanks this November for dollops of Microsoft patches
Don’t be a turkey – get these fixed Patch Tuesday Patch Tuesday has swung around again, and Microsoft has released fixes for 89 CVE-listed security flaws in its products – including two under active attack – and reissued three more.……
Air National Guardsman gets 15 years after splashing classified docs on Discord
Jack Teixeira, 22, talked of ‘culling the weak minded’ – hmm! A former Air National Guard member who stole classified American military secrets, and showed them to his gaming buddies on Discord, has been sentenced to 15 years in prison.……
Here’s what we know about the suspected Snowflake data extortionists
A Canadian and an American living in Turkey ‘walk into’ cloud storage environments… Two men allegedly compromised what’s believed to be multiple organizations’ Snowflake-hosted cloud environments, stole sensitive data within, and extorted at least $2.5 million from at least three…
‘Cybersecurity issue’ at Food Lion parent blamed for US grocery mayhem
Stores still open, but customers report delayed deliveries, invoicing issues, and more at Stop & Shop and others Retail giant Ahold Delhaize, which owns Food Lion and Stop & Shop, among others, is confirming outages at several of its US…
HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code
‘Once again, we’ve lost a little more faith in the internet,’ researcher says Researchers are publicizing a proof of concept (PoC) exploit for what they’re calling an unauthenticated remote code execution (RCE) vulnerability in Citrix’s Virtual Apps and Desktops.… This…
Managing third-party risks in complex IT environments
Key steps to protect your organization’s data from unauthorized external access Webinar With increasing reliance on contractors, partners, and vendors, managing third-party access to systems and data is a complex security challenge.… This article has been indexed from The Register…
Amazon confirms employee data exposed in leak linked to MOVEit vulnerability
Over 5 million records from 25 organizations posted to black hat forum Amazon employees’ data is part of a stolen trove posted to a cybercrime forum linked to last year’s MOVEit vulnerability.… This article has been indexed from The Register…
FBI issues warning as crooks ramp up emergency data request scams
Just because it’s .gov doesn’t mean that email is trustworthy Cybercrooks abusing emergency data requests in the US isn’t new, but the FBI says it’s becoming a more pronounced issue as the year draws to a close.… This article has…
Dark web crypto laundering kingpin sentenced to 12.5 years in prison
Prosecutors hand Russo-Swede a half-billion bill The operator of the longest-running money laundering machine in dark web history, Bitcoin Fog, has been sentenced to 12 years and six months in US prison.… This article has been indexed from The Register…
Alleged Snowflake attacker gets busted by Canadians – politely, we assume
Also: Crypto hacks will continue; CoD hacker gets thousands banned, and more in brief One of the suspected masterminds behind the widespread Snowflake breach has been arrested in Canada – but the saga isn’t over, eh. … This article has been…
Scattered Spider, BlackCat claw their way back from criminal underground
We all know by now that monsters never die, right? Two high-profile criminal gangs, Scattered Spider and BlackCat/ALPHV, seemed to disappear into the darkness like their namesakes following a series of splashy digital heists last year, after which there were…
Winos4.0 abuses gaming apps to infect, control Windows machines
‘Multiple’ malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.… This article has been indexed from The Register…
Don’t open that ‘copyright infringement’ email attachment – it’s an infostealer
Curiosity gives crims access to wallets and passwords Organizations should be on the lookout for bogus copyright infringement emails as they might be the latest ploy by cybercriminals to steal their data.… This article has been indexed from The Register…