How Secure Service Desk thwarts social engineering attacks and secures user verification Sponsored Post Ransomware can hit any organization at any time, and hackers are proving adept at social engineering techniques to gain access to sensitive data in any way…
Category: The Register – Security
Mirai we go again: Zero-day flaws see routers and cameras co-opted into botnet
Akamai sounds the alarm – won’t name the vendors yet, but there is a fix coming Akamai has uncovered two zero-day bugs capable of remote code execution, both being exploited to distribute the Mirai malware and built a botnet army…
New Relic warns customers it’s experienced a cyber … something
Users told to hold tight and await instructions as investigation continues Web tracking and analytics outfit New Relic has issued a scanty security advisory warning customers it has experienced a scary cyber something.… This article has been indexed from The…
North Korea makes finding a gig even harder by attacking candidates and employers
That GitHub repo an interviewer wants you to work on could be malware Palo Alto Networks’ Unit 42 has detailed a pair of job market hacking schemes linked to state-sponsored actors in North Korea: one in which the threat actors…
How to give Windows Hello the finger and login as someone on their stolen laptop
Not that we’re encouraging anyone to defeat this fingerprint authentication Hardware security hackers have detailed how it’s possible to bypass Windows Hello’s fingerprint authentication and login as someone else – if you can steal or be left alone with a…
How to give Windows Hello the finger and login as a user on their stolen laptop
Not that we’re encouraging anyone to defeat this fingerprint authentication Hardware security hackers have detailed how it’s possible to bypass Windows Hello’s fingerprint authentication and login as someone else – if you can steal or be left alone with a…
US nuke reactor lab hit by ‘gay furry hackers’ demanding cat-human mutants
Staff records swiped, leaked by gang who probably read one too many comics, sorry, graphic novels The self-described “gay furry hackers” of SiegedSec are back: this time boasting they’ve broken into America’s biggest nuclear power lab’s IT environment and stolen…
US cybercops take on ‘pig butchering’ org, return $9M in scammed crypto
Crims drain wallets of marks after letting them in on ‘awesome crypto scheme secret’ The US has seized nearly $9 million in proceeds generated by exploiting more than 70 victims across the nation in so-called “pig butchering” scams.… This article…
Microsoft’s bug bounty turns 10. Are these kinds of rewards making code more secure?
Katie Moussouris, who pioneered Redmond’s program, says folks are focusing on the wrong thing Interview Microsoft’s bug bounty program celebrated its tenth birthday this year, and has paid out $63 million to security researchers in that first decade – with…
UK’s cookie crumble: Data watchdog serves up tougher recipe for consent banners
30 days to get compliant with tracking rules or face enforcement action The UK’s Information Commissioner’s Office (ICO) is getting tough on website design, insisting that opting out of cookies must be as simple as opting in.… This article has…
Binance and CEO admit financial crimes, billions coughed up to US govt
Chief quits, pays own penalty after helping crooks launder cash, aiding sanctions evaders The world’s largest cryptocurrency exchange just got a little smaller, with the US Department of Justice announcing Binance and its CEO Changpeng Zhao have both pleaded guilty…
Sumo Logic wrestles with security breach, pins down customer data
Compromised AWS account led to fears that user info could have been exposed to cybercriminals Sumo Logic has confirmed that no customer data was compromised as a result of the potential security breach it discovered on November 3.… This article…
The XBOM vs SBOM debate
Why an eXtended Software Bill of Materials could be the next step up in cybersecurity Webinar A Software Bill of Materials (SBOM) has become a non-negotiable requirement to meet regulatory and buyer requirements. But does this provide enough protection if…
Third-party data breach affecting Canadian government could involve data from 1999
Any govt staffers who used relocation services over past 24 years could be at risk The government of Canada has confirmed its data was accessed after two of its third-party service providers were attacked.… This article has been indexed from…
Maintaining a state of readiness to deal with cyber attacks
Continuous training can help improve EMEA organisations’ ability to fend off the cyber criminals in 2024 Sponsored Post You can never afford to drop your guard when it comes to cyber security – hackers never do. Any weakness in your…
MOVEit victim count latest: 2.6K+ orgs hit, 77M+ people’s data stolen
Real-life impact of buggy software laid bare – plus: Avast tries to profit from being caught up in attacks Quick show of hands: whose data hasn’t been stolen in the mass exploitation of Progress Software’s vulnerable MOVEit file transfer application?…
Former infosec COO pleads guilty to attacking hospitals to drum up business
Admits to taking phones used for ‘code blue’ emergencies offline and more An Atlanta tech company’s former COO has pleaded guilty to a 2018 incident in which he deliberately launched online attacks on two hospitals, later citing the incidents in…
Rhysida ransomware gang: We attacked the British Library
Crims post passport scans and internal forms up for ‘auction’ to prove it The Rhysida ransomware group says it’s behind the highly disruptive October cyberattack on the British Library, leaking a snippet of stolen data in the process.… This article…
Your password hygiene remains atrocious, says NordPass
ALSO: FCC cracks down on SIM-swap scams, old ZeroLogon targeted by new ransomware, and critical vulnerabilities Infosec in brief It’s that time of year again – NordPass has released its annual list of the most common passwords. And while it…
LockBit redraws negotiation tactics after affiliates fail to squeeze victims
Cybercrime group worried over dwindling payments … didn’t they tell them to Always Be Closing? In response to growing frustrations inside the LockBit organization, its leaders have overhauled the way they negotiate with ransomware victims going forward.… This article has…