CEO Bob VanKirk makes near-20-year partnership official, teases big things coming to EMEA Channel-focused cybersecurity company SonicWall is buying Virginia-based MSSP Solutions Granted – its first acquisition in well over a decade.… This article has been indexed from The Register…
Category: The Register – Security
Samsung UK discloses year-long breach, leaked customer data
Chaebol already the subject of suits for a pair of past indiscretions The UK division of Samsung Electronics has allegedly alerted customers of a year-long data breach – the third such incident the South Korean giant has experienced around the…
Look out, Scattered Spider. FBI pumps ‘significant’ resources into snaring data-theft crew
Absence of arrests doesn’t mean nothing’s happening, cyber-cops insist The FBI is applying “significant” resources to find members of the infamous Scattered Spider cyber-crime crew, which seemingly attacked a couple of high-profile casinos a few months ago and remains active,…
Rackspace racks up $12M bill in ransomware raid recovery
And that’s not counting the incoming lawsuits Rackspace’s costs from last year’s ransomware infection continue to mount: the cloud hosting biz told America’s financial watchdog, the SEC, its total expenses to date regarding that cyberattack have reached $12 million –…
Windows Server 2022 update gave ESXi host VMs the blue screen blues
Wild idea: Maybe Microsoft could introduce a Quality Copilot to stop pushing broken patches Something likely to be absent from Microsoft’s Ignite event is talk of a fix rolled out to deal with malfunctioning Windows Server 2022 Virtual Machines following…
BlackCat plays with malvertising traps to lure corporate victims
Ads for Slack and Cisco AnyConnect actually downloaded Nitrogen malware Affiliates of the ALPHV/BlackCat ransomware-as-a-service operation are turning to malvertising campaigns to establish an initial foothold in their victims’ systems.… This article has been indexed from The Register – Security…
Royal Mail’s recovery from ransomware attack will cost business at least $12M
First time hard figure given on recovery costs for January incident Royal Mail’s parent company has revealed for the first time the infrastructure costs associated with its January ransomware attack.… This article has been indexed from The Register – Security…
Hundreds of websites cloned to run ads for Chinese football gambling outfits
Linked to org that UK authorities found once failed its anti-money-laundering obligations Swedish digital rights organization Qurium has discovered around 250 cloned websites and suggested they exist to drive people to China-linked gambling sites.… This article has been indexed from…
Clorox CISO flushes self after multi-million-dollar cyberattack
Plus: Ransomware crooks file SEC complaint against victim The Clorox Company’s chief security officer has left her job in the wake of a corporate network breach that cost the manufacturer hundreds of millions of dollars.… This article has been indexed…
Google Workspace weaknesses allow plaintext password theft
Exploits come with caveats, but Google says no fixes as user security should do the heavy lifting here Novel weaknesses in Google Workspace have been exposed by researchers, with exploits potentially leading to ransomware attacks, data exfiltration, and password decryption.……
FBI Director: FISA Section 702 warrant requirement a ‘de facto ban’
War of words escalates as deadline draws near FBI director Christopher Wray made yet another impassioned plea to US lawmakers to kill a proposed warrant requirement for so-called “US person queries” of data collected via the Feds’ favorite snooping tool,…
How cyber training can help you beat the bad guys
No matter what stage your security career is at, SANS has resources that will add to your knowledge Sponsored Post Fighting cybercrime demands constant vigilance and can be a huge drain on time and resources. So it’s good to know…
Ransomware more efficient than ever, and baddies are still after your logs
Trying times for incident responders who battle fastest-ever ransomware blitz as attackers keep scrubbing evidence clean Organizations are still failing to implement adequate logging measures, increasing the difficulty faced by defenders and incident responders to identify the cause of infosec…
Another month, another bunch of fixes for Microsoft security bugs exploited in the wild
Plus: VMware closes critical hole, Adobe fixes a whopping 76 flaws Patch Tuesday Heads up: Microsoft’s November Patch Tuesday includes fixes for about 60 vulnerabilities – including three that have already been found and abused in the wild.… This article…
Russian national pleads guilty to building now-dismantled IPStorm proxy botnet
23K nodes earned operator more than $500K – and now perhaps jail time The FBI says it has dismantled another botnet and collared its operator, who admitted hijacking tens of thousands of machines around the world to create his network…
AMD SEV OMG: Trusted execution undone by cache meddling
Let’s do the CacheWarp again Boffins based in Germany and Austria have found a flaw in AMD’s SEV trusted execution environment that makes it less than trustworthy.… This article has been indexed from The Register – Security Read the original…
Intel out-of-band patch addresses privilege escalation flaw
Sapphire Rapids, Alder Lake, and Raptor Lake chip families treated for ‘Redundant Prefix’ Intel on Tuesday issued an out-of-band security update to address a privilege escalation vulnerability in recent server and personal computer chips.… This article has been indexed from…
Ransomware royale: US confirms Royal, BlackSuit are linked
Royal alone scored $275M in past year as FBI, other agencies hot on merging trail The US’ Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have released fresh guidance on the Royal ransomware operation, saying that…
Novel backdoor persists even after critical Confluence vulnerability is patched
Got a Confluence server? Listen up. Malware said to have wide-ranging capabilities A new backdoor was this week found implanted in the environments of organizations to exploit the recently disclosed critical vulnerability in Atlassian Confluence.… This article has been indexed…
Bug hunters on your marks: TETRA radio encryption algorithms to enter public domain
Emergency comms standard had five nasty flaws but will be opened to academic research A set of encryption algorithms used to secure emergency radio communications will enter the public domain after an about-face by the European Telecommunications Standards Institute (ETSI).……