First time hard figure given on recovery costs for January incident Royal Mail’s parent company has revealed for the first time the infrastructure costs associated with its January ransomware attack.… This article has been indexed from The Register – Security…
Category: The Register – Security
Hundreds of websites cloned to run ads for Chinese football gambling outfits
Linked to org that UK authorities found once failed its anti-money-laundering obligations Swedish digital rights organization Qurium has discovered around 250 cloned websites and suggested they exist to drive people to China-linked gambling sites.… This article has been indexed from…
Clorox CISO flushes self after multi-million-dollar cyberattack
Plus: Ransomware crooks file SEC complaint against victim The Clorox Company’s chief security officer has left her job in the wake of a corporate network breach that cost the manufacturer hundreds of millions of dollars.… This article has been indexed…
Google Workspace weaknesses allow plaintext password theft
Exploits come with caveats, but Google says no fixes as user security should do the heavy lifting here Novel weaknesses in Google Workspace have been exposed by researchers, with exploits potentially leading to ransomware attacks, data exfiltration, and password decryption.……
FBI Director: FISA Section 702 warrant requirement a ‘de facto ban’
War of words escalates as deadline draws near FBI director Christopher Wray made yet another impassioned plea to US lawmakers to kill a proposed warrant requirement for so-called “US person queries” of data collected via the Feds’ favorite snooping tool,…
How cyber training can help you beat the bad guys
No matter what stage your security career is at, SANS has resources that will add to your knowledge Sponsored Post Fighting cybercrime demands constant vigilance and can be a huge drain on time and resources. So it’s good to know…
Ransomware more efficient than ever, and baddies are still after your logs
Trying times for incident responders who battle fastest-ever ransomware blitz as attackers keep scrubbing evidence clean Organizations are still failing to implement adequate logging measures, increasing the difficulty faced by defenders and incident responders to identify the cause of infosec…
Another month, another bunch of fixes for Microsoft security bugs exploited in the wild
Plus: VMware closes critical hole, Adobe fixes a whopping 76 flaws Patch Tuesday Heads up: Microsoft’s November Patch Tuesday includes fixes for about 60 vulnerabilities – including three that have already been found and abused in the wild.… This article…
Russian national pleads guilty to building now-dismantled IPStorm proxy botnet
23K nodes earned operator more than $500K – and now perhaps jail time The FBI says it has dismantled another botnet and collared its operator, who admitted hijacking tens of thousands of machines around the world to create his network…
AMD SEV OMG: Trusted execution undone by cache meddling
Let’s do the CacheWarp again Boffins based in Germany and Austria have found a flaw in AMD’s SEV trusted execution environment that makes it less than trustworthy.… This article has been indexed from The Register – Security Read the original…
Intel out-of-band patch addresses privilege escalation flaw
Sapphire Rapids, Alder Lake, and Raptor Lake chip families treated for ‘Redundant Prefix’ Intel on Tuesday issued an out-of-band security update to address a privilege escalation vulnerability in recent server and personal computer chips.… This article has been indexed from…
Ransomware royale: US confirms Royal, BlackSuit are linked
Royal alone scored $275M in past year as FBI, other agencies hot on merging trail The US’ Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have released fresh guidance on the Royal ransomware operation, saying that…
Novel backdoor persists even after critical Confluence vulnerability is patched
Got a Confluence server? Listen up. Malware said to have wide-ranging capabilities A new backdoor was this week found implanted in the environments of organizations to exploit the recently disclosed critical vulnerability in Atlassian Confluence.… This article has been indexed…
Bug hunters on your marks: TETRA radio encryption algorithms to enter public domain
Emergency comms standard had five nasty flaws but will be opened to academic research A set of encryption algorithms used to secure emergency radio communications will enter the public domain after an about-face by the European Telecommunications Standards Institute (ETSI).……
NCSC says cyber-readiness of UK’s critical infrastructure isn’t up to scratch
And the world’s getting more and more dangerous The UK’s National Cyber Security Centre (NCSC) has once again sounded its concern over the rising threat level to the nation’s critical national infrastructure (CNI).… This article has been indexed from The…
Beijing reportedly asked Hikvision to identify fasting students in Muslim-majority province
University managment app also tracked library activity, holidays, and much more US-based research group IPVM has accused Chinese video surveillance equipment company Hikvision of engaging with a contract to develop technology that can identify Muslim students that are fasting during…
Passive SSH server private key compromise is real … for some vulnerable gear
OpenSSL, LibreSSL, OpenSSH users, don’t worry – you can sit this one out An academic study has shown how it’s possible for someone to snoop on certain devices’ SSH connections and, with a bit of luck, impersonate that equipment after…
Google sues scammers peddling fake malware-riddled Bard chatbot download
Plus: Chocolate Factory launches second lawsuit against false DMCA takedowns Google has sued three scammers for offering a fake download of its Bard AI chatbot that contained malware capable of stealing credentials for small business’ social media accounts.… This article…
Inside Denmark’s hell week as critical infrastructure orgs faced cyberattacks
Zyxel zero days and nation-state actors (maybe) had a hand in the sector’s worst cybersecurity event on record Danish critical infrastructure faced the biggest online attack in the country’s history in May, according to SektorCERT, Denmark’s specialist organization for the…
When traditional AV solutions are not enough
Preventing cybercriminals from exfiltrating your data with ADX technology Webinar It seems counterintuitive to want to lock in a cybercriminal who has crept past all your defences to smuggle data out from under your nose.… This article has been indexed…