There’s a blockchain involved so it’s totally going to stop you getting those calls India’s Telecom Regulatory Authority (TRAI) on Tuesday directed telcos to stop calls from unregistered telemarketers – and prevent them from using networks again for up to…
Category: The Register – Security
NIST finalizes trio of post-quantum encryption standards
Nicely ahead of that always-a-decade-away moment when all our info becomes an open book The National Institute of Standards and Technology (NIST) today released the long-awaited post-quantum encryption standards, designed to protect electronic information long into the future – when…
Patch Tuesday brings 90 new Microsoft CVEs, six already under exploit
Plus more pain for Intel which fixed 43 bugs, SAP and Adobe also in on the action Patch Tuesday Microsoft has disclosed 90 flaws in its products – six of which have already been exploited – and four others that…
Six ransomware gangs behind over 50% of 2024 attacks
Plus many more newbies waiting in the wings Despite a law enforcement takedown six months ago, LockBit 3.0 remains the most prolific encryption and extortion gang, at least so far, this year, according to Palo Alto Networks’ Unit 42.… This…
US accuses man of being ‘elite’ ransomware pioneer they’ve hunted for years
Authorities allege ‘J.P. Morgan’ practiced ‘extreme operational and online security’ The US has charged a suspect they claim is a Belarusian-Ukrainian cybercriminal whose offenses date back to 2011.… This article has been indexed from The Register – Security Read the…
Feds bust minor league Radar/Dispossessor ransomware gang
The takedown may be small but any ransomware gang sent to the shops is good news in our book The Dispossessor ransomware group is the latest to enter the cybercrime graveyard with the Feds proudly laying claim to the takedown.……
Orion SA says scammers conned company out of $60 million
Incident sounds like a BEC fraud targeting an unwitting staffer Luxembourg-based chemicals and manufacturing giant Orion SA is telling US regulators that it will lose out on around $60 million after it was targeted by a criminal wire fraud scheme.……
Who uses LLM prompt injection attacks IRL? Mostly unscrupulous job seekers, jokesters and trolls
Because apps talking like pirates and creating ASCII art never gets old Despite worries about criminals using prompt injection to trick large language models (LLMs) into leaking sensitive data or performing other destructive actions, most of these types of AI…
‘Digital arrest’ scams are big in India and may be spreading
Bad guys claim they’re cops, keep you on hold for hours until you pay to make loved ones’ crimes go away A woman in the Indian city of Delhi last week found herself under “digital arrest” – a form of…
AMD won’t patch Sinkclose security bug on older Zen CPUs
Kernel mode not good enough for you? Maybe you’ll like SMM of this Some AMD processors dating back to 2006 have a security vulnerability that’s a boon for particularly underhand malware and rogue insiders, though the chip designer is only…
Attacker steals personal data of 200K+ people with links to Arizona tech school
Nearly 50 different data points were accessed by cybercrim An Arizona tech school will send letters to 208,717 current and former students, staff, and parents whose data was exposed during a January break-in that allowed an attacker to steal nearly…
Attacker steals personal data of 200k+ people with links to Arizona tech school
Nearly 50 different data points were accessed by cybercrim An Arizona tech school will send letters to 208,717 current and former students, staff, and parents whose data was exposed during a January break-in that allowed an attacker to steal nearly…
Mega money, unfathomable violence pervade thriving underground doxxing scene
It also attracts exactly the type of unempathetic people you would think it does Black Hat Recently published interviews with known doxxers reveal the incredible finances behind the practice and how their extortion tactics are becoming increasingly violent.… This article…
Evolve your cloud security knowledge
Let SANS help you get to grips with the shifting landscape of cloud security Sponsored Post Our reliance on the cloud continues to grow steadily, with a greater variety of services than ever being hosted in it.… This article has…
Trump campaign cites Iran election phish claim as evidence leaked docs were stolen
Dots have been joined, but hard evidence is not apparent Former US president Donald Trump’s re-election campaign has claimed it’s been the victim of a cyber attack.… This article has been indexed from The Register – Security Read the original…
The UN unanimously agrees that cybercrime is bad, mkay?
Also: British nuke subs get code from Russia; and BlackSuit begs for $500M Infosec in brief The United Nations often reaches consensus rather than complete agreement, but last week a proposal from Russia to cut down on cyber crime was…
Raptor Lake microcode limits Intel chips to a mere 1.55 volts to prevent CPU destruction
Is that a lot? Depends on the context. GHz, no. Voltage, yes Intel has divulged more details on its Raptor Lake family of 13th and 14th Gen Core processor failures and the 0x129 microcode that’s supposed to prevent further damage…
Understanding escalating cyber threats
Explore the latest trends in cybersecurity with expert insight from Cloudflare Webinar As cyber threats grow more sophisticated, staying informed is crucial for IT professionals.… This article has been indexed from The Register – Security Read the original article: Understanding…
Pro-Iran groups lay groundwork for ‘chaos and violence’ as US election meddling intensifies
Political officials, advisors targeted in cyber attacks as fake news sites deliver lefty zingers Microsoft says Iran’s efforts to influence the November US presidential election have gathered pace recently and there are signs that point toward its intent to incite…
It’s 2024 and we’re just getting round to stopping browsers insecurely accessing 0.0.0.0
Can’t reach someone’s private server on localhost from outside? No problem A years-old security oversight has been addressed in basically all web browsers – Chromium-based browsers, including Microsoft Edge and Google Chrome, WebKit browsers like Apple’s Safari, and Mozilla’s Firefox.……