Untold harms of holding the corporate perimeter revealed in extensive series of interviews Ransomware attacks are being linked to a litany of psychological and physical illnesses reported by infosec professionals, and in some cases blamed for hospitalizations.… This article has…
Category: The Register – Security
Two more Citrix NetScaler bugs exploited in the wild
Just when you thought you had recovered from Bleed Two vulnerabilities in NetScaler’s ADC and Gateway products have been fixed – but not before criminals found and exploited them, according to the vendor.… This article has been indexed from The…
Google TAG: Kremlin cyber spies move into malware with a custom backdoor
The threat hunters believe COLDRIVER has used SPICA since at least November 2022 Russian cyberspies linked to the Kremlin’s Federal Security Service (FSB) are moving beyond their usual credential phishing antics and have developed a custom backdoor that they started…
Vast botnet hijacks smart TVs for prime-time cybercrime
8-year-old op responsible for DDoS attacks and commandeering broadcasts to push war material Security researchers have pinned a DDoS botnet that’s infected potentially millions of smart TVs and set-top boxes to an eight-year-old cybercrime syndicate called Bigpanzi.… This article has…
Enter the era of platform-based cloud security
How an integrated platform can streamline the management overhead, improve cloud security and boost threat visibility Sponsored Post Reports suggest that forward-looking organisations are ditching legacy point-based cloud security offerings and replacing them with more efficient integrated platforms which slash…
Insurance website’s buggy API leaked Office 365 password and a giant email trove
Pen-tester accessed more than 650,000 sensitive messages, and still can, at Indian outfit using Toyota SaaS Toyota Tsusho Insurance Broker India (TTIBI), an Indo-Japanese joint insurance venture, operated a misconfigured server that exposed more than 650,000 Microsoft-hosted email messages to…
Apple, AMD, Qualcomm GPU security hole lets miscreants snoop on AI training and chats
So much for isolation A design flaw in GPU drivers made by Apple, Qualcomm, AMD, and likely Imagination can be exploited by miscreants on a shared system to snoop on fellow users.… This article has been indexed from The Register…
What’s worse than paying an extortion bot that auto-pwned your database?
Paying one that lied to you and only saved the first 20 rows of each table Publicly exposed PostgreSQL and MySQL databases with weak passwords are being autonomously wiped out by a malicious extortion bot – one that marks who…
Windows Server 2022 patch is breaking apps for some users
Uninstall the update or edit the Windows registry to restore order The latest Windows Server 2022 patch has broken the Chrome browser, and short of uninstalling the update, a registry hack is the only way to restore service for affected…
Home improvement marketers dial up trouble from regulator
ICO slaps penalties on two businesses that collectively made more than 3 million cold calls Another week and yet another couple of pesky cold callers face fines from the UK’s data privacy watchdog for “bombarding” unsuspecting households with marketing messages…
Combination of cheap .cloud domains and fake Shark Tank news fuel unhealthy wellness scams
.SBS gTLD once owned by Australian broadcaster is another source of strife Scammers are buying up cheap domain names to host sites that sell dodgy health products using fake articles, according to cybercrime disruption outfit Netcraft.… This article has been…
Nokia walks the walk about its RAN to play on Uncle Sam’s China fears
It pays not to be Huawei, and the US military can be lucrative, too Comment A vendor establishing a business unit dedicated to government sales is not new or unusual. But Finnish telecommunications giant Nokia’s decision to do so in…
FBI: Beware of thieves building Androxgh0st botnets using stolen creds
Infecting networks via years-old CVEs that should have been patched by now Crooks are exploiting years-old vulnerabilities to deploy Androxgh0st malware and build a cloud-credential stealing botnet, according to the FBI and the Cybersecurity and Infrastructure Security Agency (CISA).… This…
Locking down the edge
Watch this webinar to find out how Zero Trust fits into the edge security ecosystem Commissioned Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites…
Patch now: Critical VMware, Atlassian flaws found
You didn’t have anything else to do this Tuesday, right? VMware and Atlassian today disclosed critical vulnerabilities and, while neither appear to have been exploited by miscreants yet, admins should patch now to avoid disappointment.… This article has been indexed…
Double trouble for VMware and Atlassian admins – critical flaws to fix
You didn’t have anything else to do this Tuesday, right? VMware and Atlassian today disclosed critical vulnerabilities and, while neither appear to have been exploited by miscreants yet, admins should patch now to avoid disappointment.… This article has been indexed…
More than 178,000 SonicWall firewalls are exposed to old denial of service bugs
Majority of public-facing devices still unpatched against critical vulns from as far back as 2022 More than 178,000 SonicWall firewalls are still vulnerable to years-old vulnerabilities, an infosec reseacher claims.… This article has been indexed from The Register – Security…
Ivanti zero-day exploits explode as bevy of attackers get in on the act
Customers still patchless and mitigation only goes so far There’s a “reasonable chance” that Ivanti Connect Secure (ICS) VPN users are already compromised if they didn’t apply the vulnerability mitigation released last week, experts say.… This article has been indexed…
China’s gambling crackdown spawned wave of illegal online casinos and crypto-crime in Asia
‘Inaccessible and autonomous armed group territories’ host crooks who use tech to launder cash, run slave scam gangs, and more Global crime networks have set up shop in autonomous territories run by armed gangs across Southeast Asia, and are using…
Thousands of Juniper Networks devices vulnerable to critical RCE bug
Yet more support for the argument to adopt memory-safe languages More than 11,500 Juniper Networks devices are exposed to a new remote code execution (RCE) vulnerability, and infosec researchers are pressing admins to urgently apply the patches.… This article has…