Kim Jong Un’s all in for home-built silicon says warning North Korean government spies have broken into the servers of at least two chipmakers and stolen product designs as part of attempts to spur Kim Jong Un’s plans for a…
Category: The Register – Security
German defense chat overheard by Russian eavesdroppers on Cisco’s WebEx
Officials can’t tell whether the tape was edited, but fear Kremlin has more juicy bits to release in the future The German Ministry of Defense (Bundeswehr) has confirmed that a recording of a call between high-ranking officials discussing war efforts…
Ransomware ban backers insist thugs must be cut off from payday
Increasingly clear number of permanent solutions is narrowing Global law enforcement authorities’ attempts to shutter the LockBit ransomware crew have sparked a fresh call for a ban on ransomware payments to perpetrators.… This article has been indexed from The Register…
The federal bureau of trolling hits LockBit, but the joke’s on us
When you can’t lock ’em up, lock ’em out Opinion The best cop shows excel at mind games: who’s tricking whom, who really wins, and what price they pay. A twist of humor adds to the drama and keeps us…
LockBit’s contested claim of fresh ransom payment suggests it’s been well hobbled
ALSO: CISA warns Ivanti vuln mitigations might not work, SAML hijack doesn’t need ADFS, and crit vulns Infosec in brief The infamous LockBit ransomware gang has been busy in the ten days since an international law enforcement operation took down…
Ahead of Super Tuesday, US elections face existential and homegrown threats
Misinformation is rife, AI makes it easier to create, and 42 percent of the planet’s inhabitants get to vote this year Feature Two US intelligence bigwigs last week issued stark warnings about foreign threats to American election integrity and security…
Air National Guardsman Teixeira to admit he was Pentagon files leaker
Turns out bragging on Discord has unfortunate consequences Jack Teixeira, the Air National Guardsman accused of leaking dozens of classified Pentagon documents, is expected to plead guilty in a US court on Monday.… This article has been indexed from The…
Judge orders NSO to cough up Pegasus super-spyware source code
/* Hope no one ever reads these functions lmao */ NSO Group, the Israel-based maker of super-charged snoopware Pegasus, has been ordered by a federal judge in California to share the source code for “all relevant spyware” with Meta’s WhatsApp.……
Iranian charged over attacks against US defense contractors, government agencies
$10M bounty for anyone with info leading to Alireza Shafie Nasab’s identification or location The US Department of Justice has unsealed an indictment accusing an Iranian national of a years-long campaign that compromised hundreds of thousands of accounts and attempting…
In the vanguard of 21st century cyber threats
Everything you need to know about quantum safe encryption Webinar The quantum threat might seem futuristic, more like something you’d encounter in a science fiction film. But it’s arguably already a danger to real cyber security defences.… This article has…
Cops visit school of ‘wrong person’s child,’ mix up victims and suspects in epic data fail
Data watchdog reprimands police force for confusing 2 people with same name and birthday to disastrous results The UK’s Information Commissioner’s Office has put the West Midlands Police (WMP) on the naughty step after the force was found to have…
Cops visit school of ‘wrong person’s child,’ mix up victims and suspects in epic data fail
Data watchdog reprimands police force for mixing up 2 people with same name and birthday with disastrous results The UK’s Information Commissioner’s Office has put the West Midlands Police (WMP) on the naughty step after the force was found to…
Keeping one step ahead of cyber security threats
How zero trust controls and Google AI can strengthen your organization’s defences Webinar Dealing with cyber security incidents is an expensive business. Each data breach costs an estimated $4.35 million on average and it’s not as if the volume of…
NTT boss takes early retirement to atone for data leak
No mere mea culpa would suffice after 9.2 million records leaked over a decade, warnings were ignored, and lies were told NTT West president Masaaki Moribayashi announced his resignation on Thursday, effective at the end of March, in atonement for…
GitHub struggles to keep up with automated malicious forks
Cloned then compromised, bad repos are forked faster than they can be removed A malware distribution campaign that began last May with a handful of malicious software packages uploaded to the Python Package Index (PyPI) has spread to GitHub and…
Turns out cops are super interested in subpoenaing suspects’ push notifications
Those little popups may reveal location, device details, IP address, and more More than 130 petitions seeking access to push notification metadata have been filed in US courts, according to a Washington Post investigation – a finding that underscores the…
US courts fielded over 130 requests for access to push notification metadata
Cops love it because popup messages can reveal location, device details, IP address and more More than 130 petitions seeking access to push notification metadata have been filed in US courts, according to a Washington Post investigation – a finding…
White House goes to court, not Congress, to renew warrantless spy powers
Choose your own FISA Section 702 adventure: End-run around lawmakers or business as usual? The Biden Administration has asked a court, rather than Congress, to renew controversial warrantless surveillance powers used by American intelligence and due to expire within weeks.…
Chinese ‘connected’ cars are a national security threat, says Biden
No Chinese automakers sell cars in the US, but the feds are still going to investigate whether they’re a threat Concerned over the chance that Chinese-made cars could pose a future threat to national security, Biden’s administration is proposing plans…
Ransomware gangs are paying attention to infostealers, so why aren’t you?
Analysts warn of big leap in cred-harvesting malware activity last year There appears to be an uptick in interest among cybercriminals in infostealers – malware designed to swipe online account passwords, financial info, and other sensitive data from infected PCs…