Don’t trust mystery digits popping up in your search bar Scammers are hijacking the search results of people needing 24/7 support from Apple, Bank of America, Facebook, HP, Microsoft, Netflix, and PayPal in an attempt to trick victims into handing…
Category: The Register – Security
Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations
It’s a marketing move to lure more affiliates, says infosec veteran The latest marketing ploy from the ransomware crooks behind the Qilin operation involves offering affiliates access to a crack team of lawyers to ramp up pressure in ransom negotiations.……
Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web
If it looks like a duck and walks like a duck… Aflac is the latest insurance company to disclose a security breach following a string of others earlier this week, all of which appear to be part of Scattered Spider’s…
Attack on Oxford City Council exposes 21 years of election worker data
Services coming back online after legacy systems compromised Oxford City Council says a cyberattack earlier this month resulted in 21 years of data being compromised.… This article has been indexed from The Register – Security Read the original article: Attack…
Boffins devise voice-altering tech to jam ‘vishing’ schemes
To stop AI scam callers, break automatic speech recognition systems Researchers based in Israel and India have developed a defense against automated call scams.… This article has been indexed from The Register – Security Read the original article: Boffins devise…
Uncle Sam seeks time in tower dump data grab case after judge calls it ‘unconstitutional’
Feds told they can’t demand a haystack to find a needle The United States is requesting [PDF] a month-long extension to the deadline for its final decision regarding an appeal against a judge’s ruling that obtaining tower dumps is unconstitutional.……
Glazed and confused: Hole lotta highly sensitive data nicked from Krispy Kreme
Experts note ‘major red flags’ in donut giant’s security as 161,676 staff and families informed of attack details Krispy Kreme finally revealed the number of people affected by its November cyberattack, and it’s easy to see why analyzing the incident…
UK gov asks university boffins to pinpoint cyber growth areas where it should splash cash
Good to see government that values its academics (cough cough). Plus: New board criticized for lacking ‘ops’ people Cybersecurity experts have started a formal review into the UK cybersecurity market, at the government’s request, to identify future growth opportunities as…
Sneaky Serpentine#Cloud slithers through Cloudflare tunnels to inject orgs with Python-based malware
Phishing, Python and RATs, oh my A sneaky malware campaign slithers through Cloudflare tunnel subdomains to execute in-memory malicious code and give unknown attackers long-term access to pwned machines.… This article has been indexed from The Register – Security Read…
Iran’s internet goes offline for hours amid claims of ‘enemy abuse’
Bank and crypto outfits hit after Israeli commander mentioned attacks expanding to ‘other areas’ The government of Iran appears to have shut down the internet within its borders, perhaps in response to Israel-linked cyberattacks.… This article has been indexed from…
Minecraft cheaters never win … but they may get malware
Infostealers posing as popular cheat tools are cropping up on GitHub Trojanized Minecraft cheat tools hosted on GitHub have secretly installed stealers that siphon credentials, crypto wallets, and other sensitive data when executed by players.… This article has been indexed…
Asana’s cutting-edge AI feature ran into a little data leakage problem
New MCP server was shut down for nearly two weeks Asana has fixed a bug in its Model Context Protocol (MCP) server that could have allowed users to view other organizations’ data, and the experimental feature is back up and…
Veeam patches third critical RCE bug in Backup & Replication in space of a year
Version 13 can’t come soon enough Veeam Backup & Replication users are urged to apply the latest patches that fix another critical bug leading to remote code execution (RCE) on backup servers.… This article has been indexed from The Register…
How to bridge the MFA gap
If a credential is worth protecting, it’s worth protecting well. Sponsored feature What do flossing and multi-factor authentication (MFA) have in common? Each is highly beneficial, yet far too few people do them consistently. MFA helps protect organizations from credential-based…
Amazon CISO: Iranian hacking crews ‘on high alert’ since Israel attack
Meanwhile, next-gen script kiddies are levelling up faster thanks to agentic AI Interview Iran’s state-sponsored cyber operatives and hacktivists have all increased their activities since the military conflict with Israel erupted last week – but not necessarily in the way…
Trump administration set to waive TikTok sell-or-die deadline for a third time
Quick reminder: The law that banned the app is called ‘Protecting Americans from Foreign Adversary Controlled Applications Act’ The Trump administration is set to again waive the 2024 law that requires the made-in-China social network TikTok to either sell its…
AWS locks down cloud security, hits 100% MFA enforcement for root users
Plus adds a ton more security capabilities for cloud customers at re:Inforce Amazon Web Services hit a major multi-factor authentication milestone, achieving 100 percent MFA enforcement for root users across all types of AWS accounts.… This article has been indexed…
Sitecore CMS flaw let attackers brute-force ‘b’ for backdoor
Hardcoded passwords and path traversals keeping bug hunters in work Security researchers have issued a warning about a pre-authentication exploit chain affecting a CMS used by some of the biggest companies in the world.… This article has been indexed from…
Redefining identity security in the age of agentic AI
Now AI agents have identity, too. Here’s how to handle it Partner content The rise of agentic AI systems is rewriting the rules of cybersecurity. Unlike generative AI, which relies on predefined instructions or prompts, AI agents operate autonomously, learn…
23andMe hit with £2.3M fine after exposing genetic data of millions
Penalty follows year-long probe into flaws that allowed attack to affect so many The UK’s data watchdog is fining beleaguered DNA testing outfit 23andMe £2.31 million ($3.13 million) over its 2023 mega breach.… This article has been indexed from The…
Scattered Spider has moved from retail to insurance
Google threat analysts warn the team behind the Marks & Spencer break-in has moved on Cyber-crime crew Scattered Spider has infected US insurance companies following a series of ransomware attacks against American and British retailers, according to Google, which urged…
Remorseless extortionists claim to have stolen thousands of files from Freedman HealthCare
The group has previously threatened to SWAT cancer patients and leaked pre-op plastic surgery photos An extortion gang claims to have breached Freedman HealthCare, a data and analytics firm whose customers include state agencies, health providers, and insurance companies, and…
Canada’s WestJet says ‘expect interruptions’ online as it navigates cybersecurity turbulence
Flights still flying – just don’t count on the app or website working smoothly Canadian airline WestJet is warning of “intermittent interruptions or errors” on its app and website as it investigates a cybersecurity incident.… This article has been indexed…
Eurocops arrest suspected Archetyp admin, shut down mega dark web drug shop
Marketplace as big as Silk Road had more than 600k users and turnover of ‘at least’ €250M Operation Deep Sentinel is the latest international law enforcement collaboration against cybercrime, shutting down Archetyp – one of the largest dark web drug…
Salesforce study finds LLM agents flunk CRM and confidentiality tests
6-in-10 success rate for single-step tasks A new benchmark developed by academics shows that LLM-based AI agents perform below par on standard CRM tests and fail to understand the need for customer confidentiality.… This article has been indexed from The…
Microsoft adds export option to Windows Recall in Europe
But lose your code and it’s gone for good Windows 11 users in the European Economic Area will shortly receive a new Recall Export feature, allowing Recall snapshots to be shared with third-party apps and websites.… This article has been…
Spy school dropout: GCHQ intern jailed for swiping classified data
Student ‘believed he could finish’ software dev ‘project alone and therefore that the rules did not apply to him’ A former GCHQ intern was jailed for seven-and-a-half years for stealing top-secret files during a year-long placement at the British intelligence…
How collaborative security can build you a better business
Getting employees on board can do more than prevent breaches; it can send profitability soaring Sponsored Post Here’s a sobering reality: 95% of data breaches involve human error. So, why do most organizations still throw technology at a fundamentally human…
Armored cash transport trucks allegedly hauled money for $190 million crypto-laundering scheme
PLUS: APNIC completes re-org; India cuts costs for chipmakers; Infosys tax probe ends; and more Asia In Brief Australia’s Federal Police (AFP) last week announced charges against four suspects for alleged participation in a money-laundering scheme that involved a security…
Dems demand audit of CVE program as Federal funding remains uncertain
PLUS: Discord invite links may not be safe; Miscreants find new way to hide malicious JavaScript; and more! Infosec In Brief A pair of Congressional Democrats have demanded a review of the Common Vulnerabilities and Exposures (CVE) program amid uncertainties…
Cyber weapons in the Israel-Iran conflict may hit the US
With Tehran’s military weakened, digital retaliation likely, experts tell The Reg The current Israel–Iran military conflict is taking place in the era of hybrid war, where cyberattacks amplify and assist missiles and troops, and is being waged between two countries…
Do you trust Xi with your ‘private’ browsing data? Apple, Google stores still offer China-based VPNs, report says
Some trace back to an outfit under US export controls for alleged PLA links Both Apple’s and Google’s online stores offer free virtual private network (VPN) apps owned by Chinese companies, according to researchers at the Tech Transparency Project, and…
Apple fixes zero-click exploit underpinning Paragon spyware attacks
Zero-day potentially tied to around 100 suspected infections in 2025 and a spyware scandal on the continent Apple has updated its iOS/iPadOS 18.3.1 documentation, confirming it introduced fixes for the zero-click vulnerability used to infect journalists with Paragon’s Graphite spyware.……
Wanted: Junior cybersecurity staff with 10 years’ experience and a PhD
Infosec employers demanding too much from early-career recruits, says ISC2 Cybersecurity hiring managers need a reality check when it comes to hiring junior staff, with job adverts littered with unfair expectations that are hampering recruitment efforts, says industry training and…
Slapped wrists for Financial Conduct Authority staff who emailed work data home
It was one of the offenders’ final warning Four staffers at the UK’s Financial Conduct Authority (FCA) were let off with warnings over separate cases involving the transmission of regulator data to their personal email accounts.… This article has been…
Ransomware scum disrupted utility services with SimpleHelp attacks
Good news: The vendor patched the flaw in January. Bad news: Not everyone got the memo Ransomware criminals infected a utility billing software providers’ customers, and in some cases disrupted services, after exploiting unpatched versions of SimpleHelp’s remote monitoring and…
‘Major compromise’ at NHS temping arm exposed gaping security holes
Incident responders suggested sweeping improvements following Active Directory database heist Exclusive Cybercriminals broke into systems belonging to the UK’s NHS Professionals body in May 2024, stealing its Active Directory database, but the healthcare organization never publicly disclosed it, The Register…
DeepSeek installer or just malware in disguise? Click around and find out
‘BrowserVenom’ is pure poison Suspected cybercriminals have created a fake installer for Chinese AI model DeepSeek-R1 and loaded it with previously unknown malware called “BrowserVenom”.… This article has been indexed from The Register – Security Read the original article: DeepSeek…
Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks
The 16 other flagged issues are on customers, says CRM giant Salesforce has assigned five CVE identifiers following a security report that uncovered more than 20 configuration weaknesses, some of which exposed customers to unauthorized access and session hijacking.… This…
Hire me! To drop malware on your computer
FIN6 moves from point-of-sale compromise to phishing recruiters In a scam that flips the script on fake IT worker schemes, cybercriminals posing as job seekers on LinkedIn and Indeed are targeting recruiters – a group hated only slightly less than…
Asia dismantles 20,000 malicious domains in infostealer crackdown
Interpol coordinates operation, nabs 32 across Vietnam, Sri Lanka, and Nauru Thirty-two people across Asia have been arrested over their suspected involvement with infostealer malware in the latest international collaboration against global cybercrime.… This article has been indexed from The…
Analysis to action: Operationalizing your threat intelligence
Timing is everything in the war against ransomware thieves, says Prelude Security Partner content When a new security advisory drops or an alarming new ransomware campaign makes the news, the question from leadership inevitably follows: “Are we covered?”… This article…
Microsoft slows Windows 11 24H2 Patch Tuesday due to a ‘compatibility issue’
On your marks, get set… bork! Microsoft has set a new record with June’s security update for the time between release and an admission of borkage.… This article has been indexed from The Register – Security Read the original article:…
CISO who helped unmask Badbox warns: Version 3 is coming
The botnet’s still alive and evolving Badbox 2.0, the botnet that infected millions of smart TV boxes and connected devices before private security researchers and law enforcement partially disrupted its infrastructure, is readying for a third round of fraud and…
Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack
Stealthy Falcon swoops on WebDAV and Redmond’s even patching IE! Patch Tuesday It’s Patch Tuesday time again, and Microsoft is warning that there are a bunch of critical fixes to sort out – and two actively exploited bugs.… This article…
Texas warns 300,000 crash reports siphoned via compromised user account
Lone Star State drivers with accident records need to be careful about fraud The Texas Department of Transportation says a compromised user account was used to improperly download nearly 300,000 crash reports, exposing personal data that could be exploited for…
Critical Wazuh bug exploited in growing Mirai botnet infection
The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code execution bug was disclosed.……
Winning the war on ransomware with AI: Four real-world use cases
AI is your secret weapon against ransomware crooks. Here’s how to use it Partner Content Cybercriminals are evolving, and so are the tools to stop them. As AI becomes more accessible, attackers are sharpening their tactics. But here’s the good…
Trump guts digital ID rules, claims they help ‘illegal aliens’ commit fraud
Also axes secure software mandates – optional is the new secure, apparently President Donald Trump late Friday signed a cybersecurity-focused executive order that, in the White House’s words, “amends problematic elements of Obama and Biden-era Executive Orders.”… This article has…
Cloud brute-force attack cracks Google users’ phone numbers in minutes
Chocolate Factory fixes issue, pays only $5K A researcher has exposed a flaw in Google’s authentication systems, opening it to a brute-force attack that left users’ mobile numbers up for grabs.… This article has been indexed from The Register –…
M&S online ordering system operational 46 days after cyber shutdown
A milestone in cyberattack recovery – but deliveries will take a while and normal service not yet back UK retailer Marks & Spencer has reinstated online orders for some customers, marking a major milestone in its recovery from a cyberattack…
Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser
Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what’s possible.… This article…
Apple tries to contain itself with lightweight Linux VMs for macOS
Swift-based containerization framework aims to improve performance and security Apple on Monday unveiled an open source containerization framework for creating and running Linux container images on the Mac.… This article has been indexed from The Register – Security Read the…
Let them eat junk food: Major organic supplier to Whole Foods, Walmart, hit by cyberattack
United Natural Foods shut down some of its systems on June 5 after spotting network intruders North American grocery wholesaler United Natural Foods told regulators that a cyber incident temporarily disrupted operations, including its ability to fulfill customer orders.… This…
Blocking stolen phones from the cloud can be done, should be done, won’t be done
Big tech can’t be bothered to fight crime. It can barely be bothered even to say so Opinion A lot of our tech world is nightmarish, but sometimes this is literally true.… This article has been indexed from The Register…
Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs
SentinelOne discovered the campaign when they tried to hit the security vendor’s own servers An IT services company, a European media group, and a South Asian government entity are among the more than 75 companies where China-linked groups have planted…
Are technologists a threat to doing business securely?
Why an obsession with technology prevents us from reducing human-initiated cybersecurity breaches Partner content Cybersecurity leaders are fighting an invisible war, not just with threat actors but within their own organizations. It’s a conflict I’ve spent a lot of time…
China’s asteroid-and-comet hunter probe unfurls a ‘solar wing’
PLUS: Hitachi turns greybeards into AI agents; Tiananmen anniversary censorship; AWS in Taiwan; and more! China’s space agency has revealed its Tianwen 2 probe has unfurled a ‘solar wing’.… This article has been indexed from The Register – Security Read…
US infrastructure could crumble under cyberattack, ex-NSA advisor warns
PLUS: Doxxers jailed; Botnets bounce back; CISA questioned over app-vetting program closure; And more Infosec in Brief If a cyberattack hit critical infrastructure in the US, it would likely crumble, former deputy national security adviser and NSA cybersecurity director Anne…
Enterprises are getting stuck in AI pilot hell, say Chatterbox Labs execs
Security, not model performance, is what’s stalling adoption Interview Before AI becomes commonplace in enterprises, corporate leaders have to commit to an ongoing security testing regime tuned to the nuances of AI models.… This article has been indexed from The…
ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist
OpenAI boots accounts linked to 10 malicious campaigns Fake IT workers possibly linked to North Korea, Beijing-backed cyber operatives, and Russian malware slingers are among the baddies using ChatGPT for evil, according to OpenAI’s latest threat report.… This article has…
Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure
Destructive malware has been a hallmark of Putin’s multi-modal war A new strain of wiper malware targeting Ukrainian infrastructure is being linked to pro-Russian hackers, in the latest sign of Moscow’s evolving cyber tactics.… This article has been indexed from…
Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring
The cash has been frozen for more than two years The US is looking to finally capture the $7.74 million it froze over two years ago after indicting alleged money launderers it claims are behind North Korean IT worker schemes.……
Your ransomware nightmare just came true – now what?
Don’t negotiate unless you must, and if so, drag it out as long as you can Feature So, the worst has happened. Computer screens all over your org are flashing up a warning that you’ve been infected by ransomware, or…
Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies
Any info on Maxim Rudometov and his associates? There’s $$$ in it for you The US government is offering up to $10 million for information on foreign government-backed threat actors linked to the RedLine malware, including its suspected developer, Maxim…
AT&T not sure if new customer data dump is déjà vu
Re-selling info from an earlier breach? Probably. But which one? AT&T is investigating claims that millions of its customers’ data are listed for sale on a cybercrime forum in what appears to be a re-release from an earlier hack.… This…
Trump’s cyber czar pick grilled over CISA cuts: ‘If we have a cyber 9/11, you’re the guy’
Plus: Plankey’s confirmation process ‘temporarily delayed’ Sean Cairncross, President Donald Trump’s nominee to serve as national cyber director, doubled down on taking offensive cyber actions against foreign adversaries during a Senate homeland security committee nomination hearing on Thursday, and refused…
Cellebrite buys Corellium to help cops bust phone encryption
Trump-pardoned hacker Chris Wade will join the company as CTO Cellebrite has announced a $170 million deal to buy Corellium, bringing together two companies that have made names for themselves by helping law enforcement break into encrypted devices.… This article…
BidenCash busted as Feds nuke stolen credit card bazaar
Dark web crime platform raked in $17M+ over three years of operation Uncle Sam has seized 145 domains tied to BidenCash, the notorious dark web market that trafficked in more than 15 million stolen credit cards.… This article has been…
More than a hundred backdoored malware repos traced to single GitHub user
Someone went to great lengths to prey on the next generation of cybercrooks Sophos thinks a single person or group called “ischhfd83” is behind more than a hundred backdoored malware variants targeting novice cybercriminals and video game cheaters looking to…
HMRC: Crooks broke into 100k accounts, stole £43M from British taxpayer in late 2024
It’s definitely not a cyberattack though! Really! The UK’s tax collections agency says cyberbaddies defrauded it of £47 million ($63 million) late last year, but insists the criminal case was not a cyberattack.… This article has been indexed from The…
AI kept 15-year-old zombie vuln alive, but its time is drawing near
Researchers have come up with a fix for a path traversal bug first spotted in 2010 A security bug that surfaced fifteen years ago in a public post on GitHub has survived developers’ attempts on its life.… This article has…
China accuses Taiwan of running five feeble APT gangs, with US help
The authors who claimed America hacked itself to discredit Beijing are back with another report Beijing complains it’s under relentless attack by the equivalent of an ant trying to shake a tree China’s National Computer Virus Emergency Response Center on…
IBM Cloud login breaks for second time this week and Big Blue isn’t saying why
To make matters worse, IBM’s security software has a critical vuln caused by exposed password IBM isn’t having its best week after the company experienced another cloudy outage and a critical-rated vulnerability.… This article has been indexed from The Register…
Play ransomware crims exploit SimpleHelp flaw in double-extortion schemes
Recompiled binaries and phone threats used to boost the pressure Groups linked with the Play ransomware have exploited more than 900 organizations, the FBI said Wednesday, and have developed a number of new techniques in their double-extortion campaigns – including…
Ukraine strikes Russian bomber-maker with hack attack
Drones are not enough Following a daring drone attack on Russian airfields, Ukrainian military intelligence has reportedly also hacked the servers of Tupolev, the Kremlin’s strategic bomber maker.… This article has been indexed from The Register – Security Read the…
Ransomware scum leak patient data after disrupting chemo treatments at Kettering
Literally adding insult to injury Kettering Health patients who had chemotherapy sessions and pre-surgery appointments canceled due to a ransomware attack in May now have to deal with the painful prospect that their personal info may have been leaked online.……
Fake IT support calls hit 20 orgs, end in stolen Salesforce data and extortion, Google warns
Victims include hospitality, retail and education sectors A group of financially motivated cyberscammers who specialize in Scattered-Spider-like fake IT support phone calls managed to trick employees at about 20 organizations into installing a modified version of Salesforce’s Data Loader that…
Crims stole 40,000 people’s data from our network, admits publisher Lee Enterprises
Did somebody say ransomware? Not the newspaper group, not even to deny it Regional newspaper publisher Lee Enterprises says data belonging to around 40,000 people was stolen during an attack on its network earlier this year.… This article has been…
UK CyberEM Command to spearhead new era of armed conflict
Government details latest initiative following announcement last week Revealing more details about the Cyber and Electromagnetic (CyberEM) military domain, the UK’s Ministry of Defence (MoD) says “there are pockets of excellence” but improvements must be made to ensure the country’s…
Ukraine war spurred infosec vet Mikko Hyppönen to pivot to drones
Why? There’s a war in Europe, Finland has a belligerent neighbor, and cyber is a settled field Interview Mikko Hyppönen has spent the last 34 years creating security software that defends against criminals and state-backed actors, but now he’s moving…
‘Deliberate attack’ deletes shopping app’s AWS and GitHub resources
CEO of India’s KiranaPro, which brings convenience stores online, vows to name the perp The CEO of Indian grocery ordering app KiranaPro has claimed an attacker deleted its GitHub and AWS resources in a targeted and deliberate attack and vowed…
Meta pauses mobile port tracking tech on Android after researchers cry foul
Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins Security researchers say Meta and Yandex used native Android apps to listen on localhost ports, allowing them to link web browsing data to user identities…
You say Cozy Bear, I say Midnight Blizzard, Voodoo Bear, APT29 …
Microsoft, CrowdStrike, and pals promise clarity on cybercrew naming, deliver alias salad instead Opinion Microsoft and CrowdStrike made a lot of noise on Monday about teaming up with other threat-intel outfits to “bring clarity to threat-actor naming.”… This article has…
Google quietly pushes emergency fix for Chrome 0-day as exploit runs wild
TAG team spotted the V8 bug first, so you can bet nation-states weren’t far behind Google revealed Monday that it had quietly deployed a configuration change last week to block active exploitation of a Chrome zero-day.… This article has been…
X’s new ‘encrypted’ XChat feature seems no more secure than the failure that came before it
Musk’s ‘Bitcoin-style encryption’ claim has experts scratching their heads Elon Musk’s X social media platform is rolling out a new version of its direct messaging feature that the platform owner said had a “whole new architecture,” but as with many…
Crooks fleece The North Face accounts with recycled logins
Outdoorsy brand blames credential stuffing Joining the long queue of retailers dealing with cyber mishaps is outdoorsy fashion brand The North Face, which says crooks broke into some customer accounts using login creds pinched from breaches elsewhere.… This article has…
Microsoft patches the patch that put Windows 11 in a coma
Out-of-band is becoming the norm rather than the exception Microsoft is patching another patch that dumped some PCs into recovery mode with an unhelpful error code.… This article has been indexed from The Register – Security Read the original article:…
Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable
To stop the JINX-0132 gang behind these attacks, pay attention to HashiCorp, Docker, and Gitea security settings Up to a quarter of all cloud users are at risk of having their computing resources stolen and used to illicitly mine for…
Bling slinger Cartier tells customers to be wary of phishing attacks after intrusion
Nothing terribly valuable taken in data heist, though privacy a little tarnished Global jewelry giant Cartier is writing to customers to confirm their data was exposed to cybercriminals that broke into its systems.… This article has been indexed from The…
Ukrainians smuggle drones hidden in cabins on trucks to strike Russian airfields
A real-world Trojan Horse attack Ukraine claims it launched a cunning drone strike on Sunday against multiple Russian airbases, hitting over 40 military aircraft and inflicting an estimated $7 billion in damage, in an operation dubbed “Spiderweb.”… This article has…
US community bank says thieves drained customer data through third party hole
Disclosure at MainStreet Bancshares comes as American finance orgs beg for looser reporting requirements Community bank MainStreet Bancshares says thieves stole data belonging to some of its customers during an attack on a third-party provider.… This article has been indexed…
Lumma infostealer takedown may have inflicted only a flesh wound as crew keeps pinching and selling data
PLUS: Ransomware gang using tech support scam; Czechia accuses China of infrastructure attack; And more! Infosec In Brief Despite last week’s FBI announcement that it helped to take down the crew behind the Lumma infostealer, the malware continues to operate.……
Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
‘It’s a high-stakes intelligence war’ he told El Reg exclusive A mystery whistleblower calling himself GangExposed has exposed key figures behind the Conti and Trickbot ransomware crews, publishing a trove of internal files and naming names.… This article has been…
ConnectWise customers get mysterious warning about ‘sophisticated’ nation-state hack
Pen tester on ScreenConnect bug: This one ‘terrifies’ me ConnectWise has brought in the big guns to investigate a “sophisticated nation state actor” that broke into its IT environment and then breached some of its customers.… This article has been…
Feds arrest DoD techie, claim he dumped top secret files in park for foreign spies to find
28-year-old alleged to have made multiple drops to folks who turned out to be undercover FBI agents A Defense Intelligence Agency (DIA) IT specialist is scheduled to appear in court today after being caught by the FBI trying to surreptitiously…
US medical org pays $50M+ to settle case after crims raided data and threatened to swat cancer patients
Cash splashed on damages, infrastructure improvements, and fraud monitoring A Seattle cancer facility has agreed to fork out around $52.5 million as part of a class action settlement linked to a Thanksgiving 2023 cyberattack where criminals directly threatened cancer patients…
Meta – yep, Facebook Meta – is now a defense contractor
Giving people the power to build community and bring the world closer together so we can shoot them Meta has partnered with Anduril Industries to build augmented and virtual reality devices for the military, eight years after it fired the…
Crims defeat human intelligence with fake AI installers they poison with ransomware
Take care when downloading AI freebies, researcher tells The Register Criminals are using installers for fake AI software to distribute ransomware and other destructive malware.… This article has been indexed from The Register – Security Read the original article: Crims…
Data watchdog put cops on naughty step for lost CCTV footage
Greater Manchester Police reprimanded over hours of video that went AWOL The UK’s data watchdog has reprimanded Greater Manchester Police (GMP) force for losing CCTV footage the cop shop was later requested to retain.… This article has been indexed from…