Category: The Register – Security

Attack on LexisNexis Risk Solutions exposes data on 300k +

Data analytics and risk management biz says software dev platform breached, not itself LexisNexis Risk Solutions (LNRS) is the latest big-name organization to disclose a serious cyberattack leading to data theft, with the number of affected individuals pegged at 364,333.……

Grandpa-conning crook jailed over sugar-coated drug scam

Callous fraudster tricked elderly gents into smuggling meth hidden in chocolate truffles A ruthless cyber conman who duped elderly pensioners – including an 80-year-old man – into smuggling deadly class A drugs was this week locked up.… This article has…

How lean security teams can build resilient defenses

Improving security on a budget with continuous monitoring Partner content  Most security teams face a staggering challenge. They’re tasked with protecting themselves against the same advanced threats as any large enterprise, but often have a fraction of the budget, tools,…

Scottish council admits ransomware crooks stole school data

Parents and teachers have personal info, ID documents leaked online, but exam season mostly unaffected Scotland’s West Lothian Council has confirmed that data was stolen from its education network after the Interlock ransomware group claimed responsibility for the intrusion earlier…

M&S warns of £300M dent in profits from cyberattack

Downtime stings retailer, with technical recovery costs coming at a later date Marks & Spencer says the disruption related to its ongoing cyberattack is likely to knock around £300 million ($402 million) off its operating profits for the next financial…

UK ‘extremely dependent’ on US for space security

After 60 years+ cooperation on space and military ops, worrying ‘rhetoric’ from Team Trump has Brits examining options The current rhetoric coming from the US is “alarming” for the UK, which depends on a continuation of their long-standing co-operation around…

‘Ongoing’ Ivanti hijack bug exploitation reaches clouds

Nothing like insecure code in security suites The “ongoing exploitation” of two Ivanti bugs has now extended beyond on-premises environments and hit customers’ cloud instances, according to security shop Wiz.… This article has been indexed from The Register – Security…

CISA has a new No. 2 … but still no official top dog

Brain drain, budget cuts, constant cyberthreats – who wouldn’t want this job? The US Cybersecurity and Infrastructure Security Agency (CISA) has a new No. 2: Madhu Gottumukkala, stepping in as the nation’s lead civilian cyber agency faces budget cuts, a…

CISA has a new No. 2 – but still no official top dog

Brain drain, budget cuts, and constant cyberthreats – who wouldn’t want this job? The US Cybersecurity and Infrastructure Security Agency (CISA) has a new No. 2: Madhu Gottumukkala, stepping in as the nation’s lead civilian cyber agency faces budget cuts,…

Defamation case against DEF CON terminated with prejudice

‘We hope it makes attendees feel safe reporting violations’ A Seattle court this week dismissed with prejudice the defamation case brought against DEF CON and its organizer Jeff Moss by former conference stalwart Christopher Hadnagy.… This article has been indexed…

From hype to harm: 78% of CISOs see AI attacks already

AI attacks are keeping most practitioners up at night, says Darktrace, and with good reason Sponsored feature  From the written word through to gunpowder and email, whenever an enabling technology comes along, you can be sure someone will be ready…

Cyber fiends battering UK retailers now turn to US stores

DragonForce-riding ransomware ring also has ‘shiny object syndrome’ so will likely move on to another sector soon The same miscreants behind recent cyberattacks on British retailers are now trying to dig their claws into major American retailers’ IT environments –…

Why CVSS is failing us and what we can do about it

How Adversarial Exposure Validation is changing the way we approach vulnerability management Partner content  Two decades ago, CVSS revolutionized vulnerability management, enabling security teams to speak a common language when measuring and prioritizing risks posed by the vulnerability to the…