Tag: The Register – Security

A data leak and a data breach

How to protect personal data Partner Content  For people who haven’t personally experienced them, terms like data leak or data breach may seem unfamiliar and foreign – much like visiting a new destination abroad.… This article has been indexed from…

Ivanti patches exploited admin command execution flaw

Fears over chained attacks affecting EOL product The US Cybersecurity and Infrastructure Security Agency (CISA) just added the latest Ivanti weakness to its Known Exploited Vulnerability (KEV) catalog, a situation sure to annoy some – given that it’s yet another…

Putin really wants Trump back in the White House

US govt, Microsoft report on Kremlin trolls’ latest antics to Make America Grate Again Russia really wants Donald Trump to be the next US President, judging by reports from American government agencies and now Microsoft’s threat intelligence team.… This article…

LockBit boasts of ransoming IRS-authorized eFile.com

Add ‘ransomware’ to the list of certainties in life? Notorious ransomware gang LockBit claims to have compromised eFile.com, which offers online services for electronically filing tax returns with the US Internal Revenue Service (IRS).… This article has been indexed from…

Secure your organization

Ransomware resilience in a multi-cloud world: attend this exclusive event in Boston, MA Sponsored Event  Join us on October 24 in Boston for an exclusive event designed for IT professionals and industry leaders dedicated to mastering cybersecurity in multi-cloud environments.……

Predator spyware kingpins added to US sanctions list

Designations come as new infrastructure spins up in Africa Five individuals and one company with ties to spyware developer Intellexa are the latest to earn sanctions as the US expands efforts to stamp out spyware.… This article has been indexed…

The empire of C++ strikes back with Safe C++ blueprint

You pipsqueaks want memory safety? We’ll show you memory safety! We’ll borrow that borrow checker After two years of being beaten with the memory-safety stick, the C++ community has published a proposal to help developers write less vulnerable code.… This…

Australia’s government spent the week boxing Big Tech

With social media age limits, anti-scam laws, privacy tweaks, and misinformation rules Elon Musk labelled ‘fascist’ Australia’s government has spent the week reining in Big Tech.… This article has been indexed from The Register – Security Read the original article:…

Google Chrome gets a mind of its own for some security fixes

Browser becomes more proactive about trimming unneeded permissions and deceptive notifications Google has enhanced Chrome’s Safety Check so that it can make some security decisions on the user’s behalf.… This article has been indexed from The Register – Security Read…

EU kicks off an inquiry into Google’s AI model

Privacy regulator taking a closer look at data privacy and PaLM 2 The European Union’s key regulator for data privacy, Ireland’s Data Protection Commission (DPC), has launched a cross-border inquiry into Google’s AI model to ascertain if it complies with…

NIS2, DORA, and Tiber-EU expanding cybersecurity regulation

Get essential insights for IT security compliance and effectiveness from SANS Webinar  As cybersecurity threats evolve, so do the regulations designed to protect businesses.… This article has been indexed from The Register – Security Read the original article: NIS2, DORA,…

India to train 5000 ‘Cyber Commandos’

Minister reckons dedicated cops necessary to protect digital transactions India has announced a plan to train a specialized wing of 5000 “Cyber Commandos” in the next five years, as part of its efforts to address cyber crime.… This article has…

Strengthening enterprise storage against cyber threats

Watch this webinar for tips on enhancing resilience with advanced protection strategies Webinar  As cyberattacks like ransomware and malware grow more sophisticated, organizations need to ensure their enterprise storage systems are robust and resilient.… This article has been indexed from…

Cybersecurity regulation stepping up

Understanding new NIS2, DORA, and Tiber-EU legislation is essential to improving IT security, explains SANS Webinar  As cybersecurity regulations tighten, organisations face new challenges that require more than just compliance checklists.… This article has been indexed from The Register –…

Google says replacing C/C++ in firmware with Rust is easy

Not so much when trying to convert coding veterans Google recently rewrote the firmware for protected virtual machines in its Android Virtualization Framework using the Rust programming language and wants you to do the same, assuming you deal with firmware.……

Cisco merch shoppers stung in Magecart attack

The ‘security issue’ was caused by a 9.8-rated Magento flaw Adobe patched back in June Bad news for anyone who purchased a Cisco hoodie earlier this month: Suspected Russia-based attackers injected data-stealing JavaScript into the networking giant’s online store selling…

To patch this server, we need to get someone drunk

When maintenance windows are hard to open, a little lubrication helps On Call  The Register understands consuming alcohol is quite a popular way to wind down from the working week, but each Friday we get the party started early with…

US charges Russian GRU hackers behind WhisperGate intrusions

Feds post $10 million bounty for each of the six’s whereabouts The US today charged five Russian military intelligence officers and one civilian for their involvement with the data-wiping WhisperGate campaign conducted against Ukraine in January 2022 before the ground…

Quantum computing is coming – are you ready?

Are you prepared for the day that quantum computing breaks today’s encryption? Sponsored Feature  The internet is all about transparency and openness – connecting people and information, shoppers and vendors, or businesses. But it’s also all about security and trust.……