How to protect personal data Partner Content For people who haven’t personally experienced them, terms like data leak or data breach may seem unfamiliar and foreign – much like visiting a new destination abroad.… This article has been indexed from…
Tag: The Register – Security
Some US Kaspersky customers find their security software replaced by ‘UltraAV’
Back story to replacement for banned security app isn’t enormously reassuring Some US-based users of Kaspersky antivirus products have found their software replaced by product from by a low-profile entity named “UltraAV” – a change they didn’t ask for, and…
Telegram will now hand over IP addresses, phone numbers of suspects to cops
Maybe a spell in a French cell changed Durov’s mind In a volte-face, Telegram CEO Pavel Durov announced that the made-in-Russia messaging platform will become a lot less cozy for criminals.… This article has been indexed from The Register –…
Necro malware continues to haunt side-loaders of dodgy Android mods
11M devices exposed to trojan, Kaspersky says The Necro trojan is once again making a move against Android users, with up to eleven million individuals thought to be exposed to infected apps.… This article has been indexed from The Register…
‘Cybersecurity issue’ takes MoneyGram offline for three days – and counting
Still no ‘R’ word, but smells like ransomware from here A “cybersecurity issue” has shut down MoneyGram’s systems and payment services since Friday, and the fintech leader has yet to update customers as to when it expects to have its…
US proposes ban on Chinese, Russian connected car tech over security fears
No room for your spy mobiles on our streets The US Commerce Department has decided not to wait for the inevitable, and today announced plans that would ban connected vehicle technology – and vehicles using it – from Chinese and…
So how’s Microsoft’s Secure Future Initiative going?
34,000 engineers pledged to the cause, but no word on exec pay Microsoft took a victory lap today, touting the 34,000 full-time engineers it has dedicated to its Secure Future Initiative (SFI) since it launched almost a year ago and…
UPS supplier’s password policy flip-flops from unlimited, to 32, then 64 characters
That ‘third party’ person sure is responsible for a lot of IT blunders, eh? A major IT hardware manufacturer is correcting a recent security update after customers complained of a password character limit being introduced when there previously wasn’t one.……
Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town
No malware crew linked to this latest red-teaming tool yet Attackers are using Splinter, a new post-exploitation tool, to wreak havoc in victims’ IT environments after initial infiltration, utilizing capabilities such as executing Windows commands, stealing files, collecting cloud service…
Apple’s latest macOS release is breaking security software, network connections
PLUS: Payer of $75M ransom reportedly identified; Craigslist founder becomes security philanthropist, and more Infosec In Brief Something’s wrong with macOS Sequoia, and it’s breaking security software installed on some updated Apple systems.… This article has been indexed from The…
US indicts two over socially engineered $230M+ crypto heist
Just one victim milked of nearly a quarter of a billion bucks Two individuals are in cuffs and facing serious charges in connection to a major theft of cryptocurrency worth more than $230 million from a single victim.… This article…
Ivanti patches exploited admin command execution flaw
Fears over chained attacks affecting EOL product The US Cybersecurity and Infrastructure Security Agency (CISA) just added the latest Ivanti weakness to its Known Exploited Vulnerability (KEV) catalog, a situation sure to annoy some – given that it’s yet another…
Cybercrooks strut away with haute couture Harvey Nichols data
Nothing high-end about the sparsely detailed, poorly publicized breach High-end British department store Harvey Nichols is writing to customers to confirm some of their data was exposed in a recent cyberattack.… This article has been indexed from The Register –…
CISA boss: Makers of insecure software are the real cyber villains
Write better code, urges Jen Easterly. And while you’re at it, give crime gangs horrible names like ‘Evil Ferret’ Software developers who ship buggy, insecure code are the real villains in the cyber crime story, Jen Easterly, boss of the…
Valencia Ransomware explodes on the scene, claims California city, fashion giant, more as victims
Boasts ‘appear to be credible’ experts tell El Reg A California city, a Spanish fashion giant, an Indian paper manufacturer, and two pharmaceutical companies are the alleged victims of what looks like a new ransomware gang that started leaking stolen…
Valencia Ransomware crew explodes on the scene, claims California city, fashion giant, more as victims
Boasts ‘appear to be credible’ experts tell El Reg A California city, a Spanish fashion giant, an Indian paper manufacturer, and two pharmaceutical companies are the alleged victims of what looks like a new ransomware gang that started leaking stolen…
No way? Big Tech’s ‘lucrative surveillance’ of everyone is terrible for privacy, freedom
Says Lina Khan in latest push to rein in Meta, Google, Amazon and pals Buried beneath the endless feeds and attention-grabbing videos of the modern internet is a network of data harvesting and sale that’s perhaps far more vast than…
Iran’s cyber-goons emailed stolen Trump info to Team Biden – which ignored them
To be fair, Joe was probably taking a nap The Iranian cyber snoops who stole files from the Trump campaign, with the intention of leaking those documents, tried to slip the data to the Biden camp — but were apparently…
1 in 10 orgs dumping their security vendors after CrowdStrike outage
Many left reeling from July’s IT meltdown, but not to worry, it was all unavoidable Germany’s Federal Office for Information Security (BSI) says one in ten organizations in the country affected by CrowdStrike’s outage in July are dropping their current…
Thousands of orgs at risk of knowledge base data leaks via ServiceNow misconfigurations
Better check your widgets, people Security researchers say that thousands of companies are potentially leaking secrets from their internal knowledge base (KB) articles via ServiceNow misconfigurations.… This article has been indexed from The Register – Security Read the original article:…
UK activists targeted with Pegasus spyware ask police to charge NSO Group
4 file complaint with London’s Met, alleging malware maker helped autocratic states violate their privacy Four UK-based proponents of human rights and critics of Middle Eastern states today filed a report with London’s Metropolitan Police they hope will lead to…
Tor insists its network is safe after German cops convict CSAM dark-web admin
Outdated software blamed for cracks in the armor The Tor project has insisted its privacy-preserving powers remain potent, countering German reports that user anonymity on its network can be and has been compromised by police.… This article has been indexed…
Deja blues… LockBit boasts once again of ransoming IRS-authorized eFile.com
Add ‘ransomware’ to the list of certainties in life? Notorious ransomware gang LockBit claims once again to have compromised eFile.com, which offers online services for electronically filing tax returns with the US Internal Revenue Service (IRS).… This article has been…
FBI boss says China ‘burned down’ 260,000-device botnet when confronted by Feds
Plus: Wray tells how bureau helps certain victims negotiate with ransomware crooks China-backed spies are said to have tore down their own 260,000-device botnet after the FBI and its international pals went after them.… This article has been indexed from…
Putin really wants Trump back in the White House
US govt, Microsoft report on Kremlin trolls’ latest antics to Make America Grate Again Russia really wants Donald Trump to be the next US President, judging by reports from American government agencies and now Microsoft’s threat intelligence team.… This article…
LockBit boasts of ransoming IRS-authorized eFile.com
Add ‘ransomware’ to the list of certainties in life? Notorious ransomware gang LockBit claims to have compromised eFile.com, which offers online services for electronically filing tax returns with the US Internal Revenue Service (IRS).… This article has been indexed from…
Lebanon now hit with deadly walkie-talkie blasts as Israel declares ‘new phase’ of war
Second wave of exploding gear kills at least 14 today First it was pagers, now Lebanon is being rocked by Hezbollah’s walkie-talkies detonating across the country, leaving at least a dozen dead.… This article has been indexed from The Register…
Chinese spies spent months inside aerospace engineering firm’s network via legacy IT
Getting sloppy, Xi Exclusive Chinese state-sponsored spies have been spotted inside a global engineering firm’s network, having gained initial entry using an admin portal’s default credentials on an IBM AIX server.… This article has been indexed from The Register –…
Cops across the world arrest 51 in orchestrated takedown of Ghost crime platform
Italian mafia mobsters and Irish crime families scuppered by international cops Hours after confirming they had pwned the supposedly uncrackable encrypted messaging platform used for all manner of organized crime, Ghost, cops have now named the suspect they cuffed last…
Despite Russia warnings, Western critical infrastructure remains unprepared
‘Lives will be lost’ as Moscow ramps up offensive cyber military units Feature As Russian special forces push more overtly into online operations, network defenders should be on the hunt for digital intruders looking to carry out cyberattacks that end…
Australian Police conducted supply chain attack on criminal collaborationware
Sting led to cuffing of alleged operator behind Ghost – an app for drug trafficking, money laundering, and violence-as-a-service Australia’s Federal Police (AFP) yesterday arrested and charged a man with creating and administering an app named Ghost that was allegedly…
WhatsApp fix to make View Once chats actually disappear is beaten in less than a week
View Forever, more like it, as Meta’s privacy feature again revealed to be futile with a little light hacking A fix deployed by Meta to stop people repeatedly viewing WhatsApp’s so-called View Once messages – photos, videos, and voice recordings…
VMware patches remote make-me-root holes in vCenter Server, Cloud Foundation
Bug reports made in China Broadcom has emitted a pair of patches for vulnerabilities in VMware vCenter Server that a miscreant with network access to the software could exploit to completely commandeer a system. This also affects Cloud Foundation.… This…
VMware patches over remote make-me-root holes in vCenter Server, Cloud Foundation
Bug reports made in China Broadcom has emitted a pair of patches for vulnerabilities in VMware vCenter Server that a miscreant with network access to the software could exploit to completely commandeer a system. This also affects Cloud Foundation.… This…
Lebanon: At least nine dead, thousands hurt after Hezbollah pagers explode
Eight-year-old among those slain, Israel blamed, Iran’s Lebanese ambassador wounded, it’s said Lebanon says at least nine people, including an eight-year-old girl, were killed today after pagers used by Hezbollah members exploded across the country. Israel has been blamed.… This…
Google Cloud Document AI flaw (still) allows data theft despite bounty payout
Chocolate Factory downgrades risk, citing the need for attacker access Overly permissive settings in Google Cloud’s Document AI service could be abused by data thieves to break into Cloud Storage buckets and steal sensitive information.… This article has been indexed…
At least nine dead, thousands hurt in Lebanon after Hezbollah pagers explode
Eight-year-old among those slain, Israel blamed, Iran’s Lebanese ambassador wounded, it’s reported Lebanon says at least nine people, including an eight-year-old girl, were killed today after pagers used by Hezbollah members exploded across the country. Israel has been blamed.… This…
Hezbollah claims dozens dead as its pagers go boom, not beep
Iran’s Lebanese ambassador reportedly among the injured Terrorist group Hezbollah is claiming that eight people have died and dozens are injured after pagers used by its troops exploded.… This article has been indexed from The Register – Security Read the…
Rhysida ransomware gang ships off Port of Seattle data for $6M
Auction acts as payback after authority publicly refuses to pay up The trend of ransomware crews claiming to sell stolen data privately instead of leaking it online continues with Rhysida marketing the data allegedly belonging to Port of Seattle for…
Secure your organization
Ransomware resilience in a multi-cloud world: attend this exclusive event in Boston, MA Sponsored Event Join us on October 24 in Boston for an exclusive event designed for IT professionals and industry leaders dedicated to mastering cybersecurity in multi-cloud environments.……
Predator spyware kingpins added to US sanctions list
Designations come as new infrastructure spins up in Africa Five individuals and one company with ties to spyware developer Intellexa are the latest to earn sanctions as the US expands efforts to stamp out spyware.… This article has been indexed…
China claims Starlink signals can reveal stealth aircraft – and what that really means
If this really was that useful, they wouldn’t be telling us According to a Chinese state-sanctioned study, signals from SpaceX Starlink broadband internet satellites could be used to track US stealth fighters, such as the F-22.… This article has been…
Microsoft confirms IE bug squashed in Patch Tuesday was exploited zero-day
The C in these CVEs stands for Confusing Analysis Microsoft, in a low-key update to its September Patch Tuesday disclosures, has confirmed a just-fixed Internet Explorer vulnerability was exploited as a zero-day before it could be patched.… This article has…
Chinese national accused by Feds of spear-phishing for NASA, military source code
May have reeled in blueprints related to weapons development A Chinese national has been accused of conducting a years-long spear-phishing campaign that aimed to steal source code from the US Army and NASA, plus other highly sensitive software used in…
The empire of C++ strikes back with Safe C++ blueprint
You pipsqueaks want memory safety? We’ll show you memory safety! We’ll borrow that borrow checker After two years of being beaten with the memory-safety stick, the C++ community has published a proposal to help developers write less vulnerable code.… This…
Snowflake slams ‘more MFA’ button again – months after Ticketmaster, Santander breaches
Now it’s the default for all new accounts Snowflake continues to push forward in strengthening its users’ cybersecurity posture by making multi-factor authentication the default for all new accounts.… This article has been indexed from The Register – Security Read…
Germany’s CDU still struggling to restore data months after June cyberattack
Putting a spanner in work for plans of opposition party to launch a comeback during next year’s elections One of Germany’s major political parties is still struggling to restore member data more than three months after a June cyberattack targeting…
Prison just got rougher as band of heinously violent cybercrims sentenced to lengthy stints
Orchestrators of abductions, torture, crypto thefts, and more get their comeuppance One cybercriminal of the most violent kind will spend his best years behind bars, as will 11 of his thug pals for a string of cryptocurrency robberies in the…
China’s quantum* crypto tech may be unhackable, but it’s hardly a secret
* Quite Unlikely A New Technology’s Useful, Man Opinion We have a new call to arms in the 21st century battlefront between the West and China. The Middle Kingdom is building an uncrackable national infrastructure based on quantum key distribution…
23andMe settles class-action breach lawsuit for $30 million
Also: Apple to end NSO Group lawsuit; Malicious Python dev job offers; Dark web kingpins busted; and more Infosec In Brief Genetic testing outfit 23andMe has settled a proposed class action case related to a 2023 data breach for $30…
Feeld dating app’s security too open-minded as private data swings into public view
No love for months-long wait to fix this, either Security researchers have revealed a litany of failures in the Feeld dating app that could be abused to access all manner of private user data, including the most sensitive images not…
Cambodian senator sanctioned by US over alleged forced labor cyber-scam camps
Do not go on holiday to the O Smach Resort The US Department of the Treasury’s Office of Foreign Assets Control issued sanctions on Thursday against Cambodian entrepreneur and senator Ly Yong Phat, for his “role in serious human rights…
Australia’s government spent the week boxing Big Tech
With social media age limits, anti-scam laws, privacy tweaks, and misinformation rules Elon Musk labelled ‘fascist’ Australia’s government has spent the week reining in Big Tech.… This article has been indexed from The Register – Security Read the original article:…
Feds pull plug on domains linked to import of Chinese gun conversion devices
Illegal goods allegedly shipped to the US labeled as toys or jewels The US Attorney’s Office in the District of Massachusetts has seized more than 350 internet domains allegedly used by Chinese outfits to sell US residents kits that convert…
‘Hadooken’ Linux malware targets Oracle WebLogic servers
Nastyware seeks creds, mines crypto, and plants ransomware that isnt deployed – for now? An unknown attacker is exploiting weak passwords to break into Oracle WebLogic servers and deploy an emerging Linux malware called Hadooken, according to researchers from cloud…
Fortinet admits miscreant got hold of customer data in the cloud
That would explain this 440GB leak, then Fortinet has admitted that bad actors accessed cloud-hosted data about its customers, but insisted it was a “limited number” of files. The question is: how limited is “limited”?… This article has been indexed…
I stole 20GB of data from Capgemini – and now I’m leaking it, says cyber-crook
Allegedly pilfered database has source code, private keys, staff info, T-Mobile VM logs, more A miscreant claims to have broken into Capgemini and leaked a large amount of sensitive data stolen from the technology services giant – including source code,…
Adobe fixed Acrobat bug, neglected to mention whole zero-day exploit thing
SaaS seller sets severity to ‘critical’ Adobe’s patch for a remote code execution (RCE) bug in Acrobat this week doesn’t mention that the vulnerability is considered a zero-day nor that a proof-of-concept (PoC) exploit exists, a researcher warns.… This article…
Mastercard splurges $2.65B on another big cyber purchase – Recorded Future
Oh, turns out there are some things money can buy Mastercard has added another security asset to its growing portfolio, laying down $2.65 billion for threat intelligence giant Recorded Future.… This article has been indexed from The Register – Security…
Google Chrome gets a mind of its own for some security fixes
Browser becomes more proactive about trimming unneeded permissions and deceptive notifications Google has enhanced Chrome’s Safety Check so that it can make some security decisions on the user’s behalf.… This article has been indexed from The Register – Security Read…
Transport for London confirms 5,000 users’ bank data exposed, pulls large chunks of IT infra offline
NCA confirms arrest of teen ‘on suspicion of Computer Misuse Act offences’ now bailed, as TfL hauls in 30k staff to do in-person password resets Breaking Transport for London’s ongoing cyber incident has taken a dark turn as the organization…
EU kicks off an inquiry into Google’s AI model
Privacy regulator taking a closer look at data privacy and PaLM 2 The European Union’s key regulator for data privacy, Ireland’s Data Protection Commission (DPC), has launched a cross-border inquiry into Google’s AI model to ascertain if it complies with…
About that Windows Installer ‘make me admin’ security hole. Here’s how it’s exploited
What kind of OS can be hijacked by clicking a link at just the right time? Microsoft’s In this week’s Patch Tuesday Microsoft alerted users to, among other vulnerabilities, a flaw in Windows Installer that can be exploited by malware…
Mind your header! There’s nothing refreshing about phishers’ latest tactic
It could lead to a costly BEC situation Palo Alto’s Unit 42 threat intel team wants to draw the security industry’s attention to an increasingly common tactic used by phishers to harvest victims’ credentials.… This article has been indexed from…
NIS2, DORA, and Tiber-EU expanding cybersecurity regulation
Get essential insights for IT security compliance and effectiveness from SANS Webinar As cybersecurity threats evolve, so do the regulations designed to protect businesses.… This article has been indexed from The Register – Security Read the original article: NIS2, DORA,…
Pokémon GO was an intelligence tool, claims Belarus military official
Augmented reality meets warped reality A defense ministry official from Belarus has claimed augmented reality game Pokémon GO was a tool of Western intelligence agencies.… This article has been indexed from The Register – Security Read the original article: Pokémon…
If HDMI screen rips aren’t good enough for you pirates, DeCENC is another way to beat web video DRM
Academically interesting technique for poking holes in paywalled tech specs An anti-piracy system to protect online video streams from unauthorized copying is flawed – and can be broken to allow streamed media from Amazon, Netflix, and others to be saved,…
Healthcare giant to pay $65M settlement after crooks stole and leaked nude patient pics
Would paying a ransom – or better security – have been cheaper and safer? A US healthcare giant will pay out $65 million to settle a class-action lawsuit brought by its own patients after ransomware crooks stole their data –…
Cyber crooks shut down UK, US schools, thousands of kids affected
No class: Black Suit ransomware gang boasts of 200GB haul from one raid Cybercriminals closed some schools in America and Britain this week, preventing kindergarteners in Washington state from attending their first-ever school day and shutting down all internet-based systems…
Major sales and ops overhaul leads to much more activity … for Meow ransomware gang
You hate to see it The Meow ransomware group has grabbed the second most active gang spot in an unexpected surge in activity following a major brand overhaul.… This article has been indexed from The Register – Security Read the…
Hunters International claims ransom on Chinese mega-bank’s London HQ
Allegedly swiped more than 5.2M files and threatens to publish the lot Ransomware gang Hunters International reportedly claims to have stolen more than 5.2 million files belonging to the London branch of the Industrial and Commercial Bank of China (ICBC),…
So you paid a ransom demand … and now the decryptor doesn’t work
A really big oh sh*t moment, for sure For C-suite execs and security leaders, discovering your organization has been breached, your critical systems locked up and your data stolen, then receiving a ransom demand, is probably the worst day of…
How $20 and a lapsed domain allowed security pros to undermine internet integrity
What happens at Black Hat… While trying to escape the Las Vegas heat during Black Hat last month, watchTowr Labs researchers decided to poke around for weaknesses in the WHOIS protocol. They claim to have found a way to undermine…
Mind the talent gap: Infosec vacancies abound, but hiring is flat
ISC2 argues security training needs to steer toward what hiring managers want The shortfall between the number of working security professionals and the number of security job openings has reached 4.8 million – a new high, according to cyber security…
India to train 5000 ‘Cyber Commandos’
Minister reckons dedicated cops necessary to protect digital transactions India has announced a plan to train a specialized wing of 5000 “Cyber Commandos” in the next five years, as part of its efforts to address cyber crime.… This article has…
Microsoft says it broke some Windows 10 patching – as it fixes flaws under attack
CISA wants you to leap on Citrix and Ivanti issues. Adobe, Intel, SAP also bid for patching priorities Patch Tuesday Another Patch Tuesday has dawned, as usual with the unpleasant news that there are pressing security weaknesses and blunders to…
Thanks, Edward Snowden: You propelled China to quantum networking leadership
Beijing aimed research at immediate needs – like blocking leaks – while the US sought abstract knowledge China has an undeniable lead in quantum networking technology – a state of affairs that should give the US pause, despite its lead…
Crypto scams rake in $5.6B a year for cyberscum lowlifes, FBI says
Elderly people report the greatest losses The FBI just dropped its annual report examining the costs of crypto-related cybercrime, painting a predictably grim picture as total losses in the US exceeded $5.6 billion in 2023 – a 45 percent year-on-year…
Thanks, Edward Snowden: you propelled China to quantum networking leadership
Beijing aimed research at immediate needs – like blocking leaks – while the US sought abstract knowledge China has an undeniable lead in quantum networking technology – a state of affairs that should give the US pause, despite its lead…
WhatsApp’s ‘View Once’ could be ‘View Whenever’ due to a flaw
It promised vanishing messages, but now ‘it’s privacy theater’ Video A popular privacy feature in WhatsApp is “completely broken and can be trivially bypassed,” according to developers at cryptowallet startup Zengo.… This article has been indexed from The Register –…
Russia’s top-secret military unit reportedly plots undersea cable ‘sabotage’
US alarmed by heightened Kremlin naval activity worldwide Russia’s naval activity near undersea cables is reportedly drawing the scrutiny of US officials, further sparking concerns that the Kremlin may be plotting to “sabotage” underwater infrastructure via a secretive, dedicated military…
Avis alerts nearly 300k car renters that crooks stole their info
‘Insider wrongdoing’ to blame for the breach Avis Rent A Car System has alerted 299,006 customers across multiple US states that their personal information was stolen in an August data breach.… This article has been indexed from The Register –…
1.7M potentially pwned after payment services provider takes a year to notice break-in
Criminals with plenty of time on their hands may now have credit card details Around 1.7 million people will receive a letter from Florida-based Slim CD, if they haven’t already, after the company detected an intrusion dating back nearly a…
Strengthening enterprise storage against cyber threats
Watch this webinar for tips on enhancing resilience with advanced protection strategies Webinar As cyberattacks like ransomware and malware grow more sophisticated, organizations need to ensure their enterprise storage systems are robust and resilient.… This article has been indexed from…
Kremlin-linked COLDRIVER crooks take pro-democracy NGOs for phishy ride
The latest of many attempts to stifle perceived threats to Putin’s regime A pro-democracy NGO in Russia says it looks like the Kremlin-linked COLDRIVER group was behind last month’s hack-and-leak job that saw files and inboxes dumped online.… This article…
Cybersecurity regulation stepping up
Understanding new NIS2, DORA, and Tiber-EU legislation is essential to improving IT security, explains SANS Webinar As cybersecurity regulations tighten, organisations face new challenges that require more than just compliance checklists.… This article has been indexed from The Register –…
Predator spyware updated with dangerous new features, also now harder to track
Plus: Trump family X accounts hijacked to promote crypto scam; Fog ransomware spreads; Hijacked PyPI packages; and more Infosec in brief After activating its chameleon field and going to ground following press attention earlier this year, the dangerous Predator commercial…
Predator spyware updated withn dangerous new features, also now harder to track
Plus: Trump family X accounts hijacked to promote crypto scam; Fog ransomware spreads; Hijacked PyPI packages; and more Infosec in brief After activating its chameleon field and going to ground following press attention earlier this year, the dangerous Predator commercial…
Despite cyberattacks, water security standards remain a pipe dream
White House floats round two of regulations It sounds like the start of a bad joke: Digital trespassers from China, Russia, and Iran break into US water systems.… This article has been indexed from The Register – Security Read the…
Google says replacing C/C++ in firmware with Rust is easy
Not so much when trying to convert coding veterans Google recently rewrote the firmware for protected virtual machines in its Android Virtualization Framework using the Rust programming language and wants you to do the same, assuming you deal with firmware.……
Cisco merch shoppers stung in Magecart attack
The ‘security issue’ was caused by a 9.8-rated Magento flaw Adobe patched back in June Bad news for anyone who purchased a Cisco hoodie earlier this month: Suspected Russia-based attackers injected data-stealing JavaScript into the networking giant’s online store selling…
To patch this server, we need to get someone drunk
When maintenance windows are hard to open, a little lubrication helps On Call The Register understands consuming alcohol is quite a popular way to wind down from the working week, but each Friday we get the party started early with…
Homeland security hopes to scuttle maritime cyber-threats with port infosec testbed
Supply chains, 13M jobs and $649B a year at risk, so Uncle Sam is fighting back – with a request for info The US Department of Homeland Security is seeking help to assess the security of tech at maritime ports,…
White House’s new fix for cyber job gaps: Serve the nation in infosec
Now do your patriotic duty and fill one of those 500k open roles, please? The White House has unveiled a new strategy to fill some of the hundreds of thousands of critical cybersecurity vacancies across the US: Pitch cyber as…
Uncle Sam charges Russian GRU cyber-spies behind ‘WhisperGate intrusions’
Feds post $10M bounty for each of the six’s whereabouts The US today charged five Russian military intelligence officers and one civilian for their alleged involvement with the data-wiping WhisperGate campaign conducted against Ukraine in January 2022 before the ground…
US charges Russian GRU hackers behind WhisperGate intrusions
Feds post $10 million bounty for each of the six’s whereabouts The US today charged five Russian military intelligence officers and one civilian for their involvement with the data-wiping WhisperGate campaign conducted against Ukraine in January 2022 before the ground…
Cisco’s Smart Licensing Utility flaws suggest it’s pretty dumb on security
Two critical holes including hardcoded admin credential If you’re running Cisco’s supposedly Smart Licensing Utility, there are two flaws you ought to patch right now.… This article has been indexed from The Register – Security Read the original article: Cisco’s…
Security boom is over, with over a third of CISOs reporting flat or falling budgets
Good news? Security is still getting a growing part of IT budget It looks like security budgets are coming up against belt-tightening policies, with chief security officers reporting budgets rising more slowly than ever and over a third saying their…
Quantum computing is coming – are you ready?
Are you prepared for the day that quantum computing breaks today’s encryption? Sponsored Feature The internet is all about transparency and openness – connecting people and information, shoppers and vendors, or businesses. But it’s also all about security and trust.……
The fingerpointing starts as cyber incident at London transport body continues
Network admins take a ride on the Fright Bus The Transport for London (TfL) “cyber incident” is heading into its third day amid claims that a popular appliance might have been the gateway for criminals to gain access to the…