Tag: The Register – Security

One third of adults can’t delete device data

Easier to let those old phones gather dust in a draw, survey finds The UK’s Information Commissioner’s Office (ICO) has warned that many adults don’t know how to wipe their old devices, and a worrying number of young people just…

Microsoft won’t let customers opt out of passkey push

Enrolment invitations will continue until security improves Microsoft last week lauded the success of its efforts to convince customers to use passkeys instead of passwords, without actually quantifying that success.… This article has been indexed from The Register – Security…

Boffins trick AI model into giving up its secrets

All it took to make an Google Edge TPU give up model hyperparameters was specific hardware, a novel attack technique … and several days Computer scientists from North Carolina State University have devised a way to copy AI models running…

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the ‘known senders’ setting Criminals are spoofing Google Calendar emails in a financially motivated phishing expedition that has already affected about 300 organizations with more than 4,000 emails sent over four weeks,…

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right? A critical security hole in Apache Struts 2, patched last week, is now being exploited using publicly available proof-of-concept (PoC) code.… This article has been indexed from…

Google Timeline location purge causes collateral damage

Privacy measure leaves some mourning lost memories A year ago, Google announced plans to save people’s Location History, which it now calls Timeline, locally on devices rather than on its servers.… This article has been indexed from The Register –…

Cyber protection made intuitive and affordable

How Cynet delivered 100 percent Protection and 100 percent Detection Visibility in 2024 MITRE ATT&CK Evaluation Partner Content  Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and…

Taming the multi-vault beast

GitGuardian takes on enterprise secrets sprawl Partner Content  With Non-Human Identities (NHIs) now outnumbering human users 100 to one in enterprise environments, managing secrets across multiple vaults has become a significant security concern.… This article has been indexed from The…

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes We now know the remote code execution vulnerability in Apache Struts 2 disclosed back in November carries a near-maximum severity rating following the publication of the CVE.… This article has…

British Army zaps drones out of the sky with laser trucks

High-energy weapon proves its mettle in testing The British Army has successfully destroyed flying drones for the first time using a high-energy laser mounted on an armored vehicle. If perfected, the technology could form an effective counter-measure against drone attacks.… This article…

AMD secure VM tech undone by DRAM meddling

Boffins devise BadRAM attack to pilfer secrets from SEV-SNP encrypted memory Researchers have found that the security mechanism AMD uses to protect virtual machine memory can be bypassed with $10 of hardware – and perhaps not even that.… This article…

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren’t; Polish spy boss arrested, and more Infosec in brief  Still smarting over that grocery disruption caused by a ransomware attack on supply chain SaaS vendor Blue…

Protect your clouds

Get best practice advice on how to safeguard your cloud infrastructure from SANS Sponsored Post  According to the 2024 IBM Cost of the Data Breach Report 40 percent of data breaches identified between March 2023 and February 2024 involved data…

Explore strategies for effective endpoint control

Discover how automation can simplify endpoint management in this webinar Webinar  Managing endpoints in today’s dynamic IT environments is becoming increasingly complex.… This article has been indexed from The Register – Security Read the original article: Explore strategies for effective…

Shape the future of UK cyber security

Support the industry by sponsoring the UK Cyber Team Competition Partner Content  The opportunity to identify, foster and nurture talented young people towards a cyber security career should always be grabbed with both hands.… This article has been indexed from…

Cops arrest suspected admin of German-language crime bazaar

Drugs, botnets, forged docs, and more generated fortune for platform sellers German authorities say they have again shut down the perhaps unwisely named Crimenetwork platform and arrested a suspected admin.… This article has been indexed from The Register – Security…

Simplifying endpoint security

Discover unified strategies to secure and manage all endpoints across your organization Webinar  As organizations expand their digital footprint, the range of endpoints – spanning from laptops to IoT devices – continues to grow.… This article has been indexed from…

Microsoft Power Pages misconfigurations exposing sensitive data

NHS supplier that leaked employee info fell victim to fiddly access controls that can leave databases dangling online Private businesses and public-sector organizations are unwittingly exposing millions of people’s sensitive information to the public internet because they misconfigure Microsoft’s Power…

Managing third-party risks in complex IT environments

Key steps to protect your organization’s data from unauthorized external access Webinar  With increasing reliance on contractors, partners, and vendors, managing third-party access to systems and data is a complex security challenge.… This article has been indexed from The Register…

Winos4.0 abuses gaming apps to infect, control Windows machines

‘Multiple’ malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.… This article has been indexed from The Register…