Company announces intent following Ticketmaster, Santander break-ins A month after incident response giant Mandiant suggested the litany of data thefts linked to Snowflake account intrusions had the common component of lacking multi-factor authentication (MFA) controls, the cloud storage and data…
Category: The Register – Security
Malware that is ‘not ransomware’ wormed its way through Fujitsu Japan’s systems
Company says data exfiltration was extremely difficult to detect Fujitsu Japan says an unspecified “advanced” malware strain was to blame for a March data theft, insisting the strain was “not ransomware”, yet it hasn’t revealed how many individuals are affected.……
Ransomware crews investing in custom data stealing malware
BlackByte, LockBit among the criminals using bespoke tools As ransomware crews increasingly shift beyond just encrypting victims’ files and demanding a payment to unlock them, instead swiping sensitive info straight away, some of the more mature crime organizations are developing…
Big Tech’s eventual response to my LLM-crasher bug report was dire
Fixes have been made, it appears, but disclosure or discussion is invisible Column Found a bug? It turns out that reporting it with a story in The Register works remarkably well … mostly. After publication of my “Kryptonite” article about…
ViperSoftX variant spotted abusing .NET runtime to disguise data theft
Freeware AutoIt also used to hide entire PowerShell environments in scripts A rapidly-changing infostealer malware known as ViperSoftX has evolved to become more dangerous, according to security researchers at threat detection vendor Trellix.… This article has been indexed from The…
RADIUS networking protocol blasted into submission through MD5-based flaw
If someone can do a little MITM’ing and hash cracking, they can log in with no valid password needed Cybersecurity experts at universities and Big Tech have disclosed a vulnerability in a common client-server networking protocol that allows snoops to…
Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday
Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday Patch Tuesday Clear your Microsoft system administrator’s diary: The bundle of fixes in Redmond’s July Patch Tuesday is a doozy, with at least two bugs…
Critical Windows licensing bugs, plus two others under attack, top Patch Tuesday
Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday Patch Tuesday Clear your Microsoft system administrator’s diary: The bundle of fixes in Redmond’s July Patch Tuesday is a doozy, with at least two bugs…
FBI, cyber-cops zap ~1K Russian AI disinfo Twitter bots
RT News snarks back after it’s accused of building social nyet-work for Kremlin The FBI and cybersecurity agencies in Canada and the Netherlands say they have taken down an almost 1,000-strong Twitter bot farm set up by Russian state-run RT…
Elexon’s Insight into UK electricity felled by expired certificate
Understanding the power needs of the UK begins with knowing when renewals are due Certificate Watch Demonstrating that Microsoft is not alone in its inability to keep track of certificates is UK power market biz Elexon.… This article has been…
Evolve Bank & Trust confirms LockBit stole 7.6 million people’s data
Making cyberattack among the largest ever recorded in finance industry Evolve Bank & Trust says the data of more than 7.6 million customers was stolen during the LockBit break-in in late May, per a fresh filing with Maine’s attorney general.……
Houthi rebels are operating their own GuardZoo spyware
Fairly ‘low budget’, unsophisticated malware, say researchers, but it can collect the same data as Pegasus Interview When it comes to surveillance malware, sophisticated spyware with complex capabilities tends to hog the limelight – for example NSO Group’s Pegasus, which…
Microsoft China staff can’t log on with an Android, so Redmond buys them iThings
Google’s absence creates software distribution issues not even mighty Microsoft can handle Microsoft China will provide staff with Apple devices so they can log on to the software giant’s systems.… This article has been indexed from The Register – Security…
Scammers double-scam victims by offering to help recover from scams
Scum keep databases of the people they’ve already skimmed Australia’s Competition and Consumer Commission has warned that scammers are targeting scam victims with fake offers to help them recover from scams.… This article has been indexed from The Register –…
China’s APT40 gang is ready to attack vulns within hours or days of public release
Lax patching and vulnerable small biz kit make life easy for Beijing’s secret-stealers Law enforcement agencies from eight nations, led by Australia, have issued an advisory that details the tradecraft used by China-aligned threat actor APT40 – aka Kryptonite Panda,…
China’s APT40 gang is ready to attack vulns within hours or days of public release.
Lax patching and vulnerable small biz kit make life easy for Beijing’s secret-stealers Law enforcement agencies from eight nations, led by Australia, have issued an advisory that details the tradecraft used by China-aligned threat actor APT40 – aka Kryptonite Panda,…
Microsoft forgets about SwiftKey’s support site
Injecting Copilot branding will not make TLS certificates auto-renew Another Microsoft certificate has expired, leaving SwiftKey users that are seeking support faced with an alarming certificate error.… This article has been indexed from The Register – Security Read the original…
Avast secretly gave DoNex ransomware decryptors to victims before crims vanished
Good riddance to another pesky tribe of miscreants Researchers at Avast have provided decryptors to DoNex ransomware victims on the down-low since March after discovering a flaw in the crims’ cryptography, the company confirmed today.… This article has been indexed…
Navigating Europe’s digital identity crossroads
How to get ready for the future of digital identity in the European Union from eIDAS 1.0 to eIDAS 2.0 and beyond Partner Content : Opening a bank account, making or receiving a payment, instructing an accountant or booking a…
Selfie-based authentication raises eyebrows among infosec experts
Vietnam now requires it for some purchases. It may be a fraud risk in Singapore. Or ML could be making it safe The use of selfies to verify identity online is an emerging trend in some parts of the world…