The biggest problem is a tendency to ignore problems you can’t see or haven’t looked for, says SecurityHQ Sponsored Feature Most experts agree cybersecurity is now so complex that managing it has become a security problem in itself.… This article…
Category: The Register – Security
Think tank report labels NSO, Lazarus, as ‘cyber mercenaries’
Sure, they do crimes. But the plausible deniability governments adore means they deserve a different label Cybercrime gangs like the notorious Lazarus group and spyware vendors like Israel’s NSO should be considered cyber mercenaries – and become the subject of…
Final Patch Tuesday of 2023 goes out with a bang
Microsoft fixed 36 flaws. Adobe addressed 212. Apple, Google, Cisco, VMware and Atlassian joined the party It’s the last Patch Tuesday of 2023, which calls for celebration – just as soon as you update Windows, Adobe, Google, Cisco, FortiGuard, SAP, VMware,…
Cloud engineer wreaks havoc on bank network after getting fired
Now he’s got two years behind bars to think about his bad choices An ex-First Republic Bank cloud engineer was sentenced to two years in prison for causing more than $220,000 in damage to his former employer’s computer network after…
Discord in the ranks: Lone Airman behind top-secret info leak on chat platform
Poor cybersecurity hygiene in the military? Surely not! There was only one US Air National Guardsman behind the leak of top-secret US military documents on Discord, but his chain of command bears some responsibility for letting it happen on their…
Northern Ireland cops count human cost of August data breach
Officers potentially targeted by dissidents can’t afford to relocate for their safety, while others seek support to change their names An official review of the Police Service of Northern Ireland’s (PSNI) August data breach has revealed the full extent of…
BlackBerry squashes plan to spin out its IoT biz
Board and incoming CEO decide reorganizing is better than splitting BlackBerry has decided its plan to split into two separate companies is not a good idea and will instead reorganize itself into two independent divisions.… This article has been indexed…
Interpol moves against human traffickers who enslave people to scam you online
Scum lure folks with promises of good jobs in crypto and then won’t let them leave Hundreds of suspected people smugglers have been arrested, and 163 potential victims rescued from servitude, as part of an Interpol-coordinated operation dubbed “Turquesa V”…
Proposed US surveillance regime would enlist more businesses
Expanded service provider definition could force cafes and hotels to spy for the feds Many US businesses may be required to assist in government-directed surveillance – depending upon which of two reform bills before Congress is approved.… This article has…
2.5M patients infected with data loss in Norton Healthcare ransomware outbreak
AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…
2.5M patents infected with data loss in Norton Healthcare ransomware outbreak
AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…
Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware
Latest offensive cyber group to switch to atypical programming for payloads Research into Lazarus Group’s attacks using Log4Shell has revealed novel malware strains written in an atypical programming language.… This article has been indexed from The Register – Security Read…
Two years on, 1 in 4 apps still vulnerable to Log4Shell
Lack of awareness still blamed for patching apathy despite it being among most infamous bugs of all time Two years after the Log4Shell vulnerability in the open source Java-based Log4j logging utility was disclosed, circa one in four applications are…
Read the clouds, reduce the cyber risk
Why a one-size- fits- all approach to cloud security is unlikely to work in multi-cloud deployments Webinar In the natural world, there are ten different kinds of cloud – a rare simplicity in meteorological terms. But in our global business…
23andMe responds to breach with new suit-limiting user terms
Also: ‘well-known Bay Area tech’ firm’s laptops stolen and check out some critical vulns Security in brief The saga of 23andMe’s mega data breach has reached something of a conclusion, with the company saying its probe has determined millions of…
VictoriaMetrics takes organic growth over investor pressure
Keeping the lights on with an enterprise product while staying true to your roots Interview Monitoring biz VictoriaMetrics is relatively unusual in its field. It is yet to accept external investment, preferring instead to try to grow organically rather than…
Hollywood plays unwitting Cameo in Kremlin plot to discredit Zelensky
Microsoft spots surge in pro-Russia exploits of video platform to spread propaganda An unknown pro-Russia influence group spent time recruiting unwitting Hollywood actors to assist in smear campaigns against Ukraine and its president Volodymyr Zelensky.… This article has been indexed…
Competing Section 702 surveillance bills on collision path for US House floor
End-of-year deadline looms on US surveillance Two competing bills to reauthorize America’s FISA Section 702 spying powers advanced in the House of Representatives committees this week, setting up Congress for a battle over warrantless surveillance before the law lapses in…
That call center tech scammer could be a human trafficking victim
Interpol increasingly concerned as abject abuse of victims scales far beyond Asia origins Human trafficking for the purposes of populating cyber scam call centers is expanding beyond southeast Asia, where the crime was previously isolated.… This article has been indexed…
Polish train maker denies claims its software bricked rolling stock maintained by competitor
Says it was probably hacked, which isn’t good news either A trio of Polish security researchers claim to have found that trains built by Newag SA contain software that sabotages them if the hardware is serviced by competitors.… This article…