Plans to share ‘vast amounts of data’ – very carefully Australia is building a top-secret cloud to host intelligence data and share it with the US and UK, which have their own clouds built for the same purpose.… This article…
Category: The Register – Security
Apple and some Linux distros are open to Bluetooth attack
Issue has been around since at least 2012 A years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm…
Locking down the edge
Watch this webinar to find out how Zero Trust fits into the edge security ecosystem Sponsored Post Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed…
A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list
Apparently no one thought to check if this D-Link router ‘issue’ was actually exploitable A security vulnerability previously added to CISA’s Known Exploited Vulnerability catalog (KEV), which was recognized by CVE Numbering Authorities (CNA), and included in reputable threat reports…
Shielding the data that drives AI
Why we need the confidence to deploy secure, compliant AI-powered applications and workloads Sponsored Feature Every organisation must prioritise the protection of mission critical data, applications and workloads or risk disaster in the face of an ever-widening threat landscape.… This…
Microsoft issues deadline for end of Windows 10 support – it’s pay to play for security
Limited options will be available into 2028, for an undisclosed price Microsoft on Tuesday warned that full security support for Windows 10 will end on October 14, 2025, but offered a lifeline for customers unable or unwilling to upgrade two…
Atlassian security advisory reveals four fresh critical flaws – in mail with dead links
Bitbucket, Confluence and Jira all in danger, again. Sigh Atlassian has emailed its customers to warn of four critical vulnerabilities, but the message had flaws of its own – the links it contained weren’t live for all readers at the…
Cisco intros AI to find firewall flaws, warns this sort of thing can’t be free
Predicts cybercrims will find binary brainboxes harder to battle Cisco’s executive veep for security Jeetu Patel has predicted that AI will change the infosec landscape, but that end users will eventually pay for the privilege of having a binary brainbox…
Fancy Bear goes phishing in US, European high-value networks
GRU-linked crew going after our code warns Microsoft – Outlook not good Fancy Bear, the Kremlin’s cyber-spy crew, has been exploiting two previously patched bugs for large-scale phishing campaigns against high-value targets – like government, defense, and aerospace agencies in the…
CISA details twin attacks on federal servers via unpatched ColdFusion flaw
Tardy IT admins likely to get a chilly reception over the lack of updates CISA has released details about a federal agency that recently had at least two public-facing servers compromised by attackers exploiting a critical Adobe ColdFusion vulnerability.… This…
DSPM deep dive: debunking data security myths
To maintain a strong data security posture, you must protect the data where it lives Partner Content There are plenty of technology acronyms in the alphabet soup of the cybersecurity industry, but DSPM is the latest one leading the charge;…
BlackCat ransomware crims threaten to directly extort victim’s customers
Accounting software firm Tipalti says it’s investigating alleged break-in of its systems The AlphV/BlackCat ransomware group said it plans to “go direct” to the clients of a firm it allegedly attacked to extort them, claiming to have infiltrated the systems…
It’s ba-ack… UK watchdog publishes age verification proposals
Won’t somebody think of the children? The UK’s communications regulator has laid out guidance on how online services might perform age checks as part of the Online Safety Act.… This article has been indexed from The Register – Security Read…
UK government denies China/Russia nuke plant hack claim
Report suggests Sellafield compromised since 2015, response seems worryingly ignorant of Stuxnet The government of the United Kingdom has issued a strongly worded denial of a report that the Sellafield nuclear complex has been compromised by malware for years.… This…
US warns Iranian terrorist crew broke into ‘multiple’ US water facilities
There’s a war on and critical infrastructure operators are still using default passwords Iran-linked cyber thugs have exploited Israeli-made programmable logic controllers (PLCs) used in “multiple” water systems and other operational technology environments at facilities across the US, according to…
Hershey phishes! – Crooks snarf chocolate lovers’ creds
Stealing Kit Kat maker’s data?! Give me a break There’s no sugarcoating this news: The Hershey Company has disclosed cyber crooks gobbled up 2,214 people’s financial information following a phishing campaign that netted the chocolate maker’s data.… This article has…
Two new versions of OpenZFS fix long-hidden corruption bug
Version 2.2.2 and also 2.1.14, showing that this wasn’t a new issue in the latest release The bug that was very occasionally corrupting data on file copies in OpenZFS 2.2.0 has been identified and fixed, and there’s a fix for…
Exposed Hugging Face API tokens offered full access to Meta’s Llama 2
With more than 1,500 tokens exposed, research highlights importance of securing supply chains in AI and ML The API tokens of tech giants Meta, Microsoft, Google, VMware, and more have been found exposed on Hugging Face, opening them up to…
New Relic’s cyber-something revealed as attack on staging systems, some users
Ongoing investigation found evidence of stolen employee creds and social engineering Nine days after issuing a vaguely worded warning about a possible cyber security incident, web tracking and analytics outfit New Relic has revealed a two-front attack.… This article has…
EU lawmakers finalize cyber security rules that panicked open source devs
PLUS: Montana TikTok ban ruled unconstitutional; Dollar Tree employee data stolen; critical vulnerabilities Infosec in brief The European Union’s Parliament and Council have reached an agreement on the Cyber Resilience Act (CRA), setting the long-awaited security regulation on a path…