Akamai says it reported the flaws to Microsoft. Redmond shrugged A series of attacks against Microsoft Active Directory domains could allow miscreants to spoof DNS records, compromise Active Directory and steal all the secrets it stores, according to Akamai security…
Category: The Register – Security
US and EU infosec authorities pen intel-sharing pact
As Cyber Solidarity Act edges closer to full adoption in Europe The US Cybersecurity and Infrastructure Security Agency (CISA) has signed a working arrangement with its EU counterparts to increase cross-border information sharing and more to tackle criminals.… This article…
Yet another UK public sector data blab, this time info of pregnant women, cancer patients
NHS Trust admits highly sensitive data left online for nearly three years More than 22,000 patients of Cambridge University Hospitals NHS Foundation Trust were hit by data leaks that took place between 2020 and 2021.… This article has been indexed…
Belgian man charged with smuggling sanctioned military tech to Russia and China
Indictments allege plot to shift FPGAs, accelerometers, and spycams A Belgian man has been arrested and charged for his role in a years-long smuggling scheme to export military-grade electronics from the US to Russia and China.… This article has been…
Australia building ‘top secret’ cloud to catch up and link with US, UK intel orgs
Plans to share ‘vast amounts of data’ – very carefully Australia is building a top-secret cloud to host intelligence data and share it with the US and UK, which have their own clouds built for the same purpose.… This article…
Apple and some Linux distros are open to Bluetooth attack
Issue has been around since at least 2012 A years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm…
Locking down the edge
Watch this webinar to find out how Zero Trust fits into the edge security ecosystem Sponsored Post Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed…
A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list
Apparently no one thought to check if this D-Link router ‘issue’ was actually exploitable A security vulnerability previously added to CISA’s Known Exploited Vulnerability catalog (KEV), which was recognized by CVE Numbering Authorities (CNA), and included in reputable threat reports…
Shielding the data that drives AI
Why we need the confidence to deploy secure, compliant AI-powered applications and workloads Sponsored Feature Every organisation must prioritise the protection of mission critical data, applications and workloads or risk disaster in the face of an ever-widening threat landscape.… This…
Microsoft issues deadline for end of Windows 10 support – it’s pay to play for security
Limited options will be available into 2028, for an undisclosed price Microsoft on Tuesday warned that full security support for Windows 10 will end on October 14, 2025, but offered a lifeline for customers unable or unwilling to upgrade two…
Atlassian security advisory reveals four fresh critical flaws – in mail with dead links
Bitbucket, Confluence and Jira all in danger, again. Sigh Atlassian has emailed its customers to warn of four critical vulnerabilities, but the message had flaws of its own – the links it contained weren’t live for all readers at the…
Cisco intros AI to find firewall flaws, warns this sort of thing can’t be free
Predicts cybercrims will find binary brainboxes harder to battle Cisco’s executive veep for security Jeetu Patel has predicted that AI will change the infosec landscape, but that end users will eventually pay for the privilege of having a binary brainbox…
Fancy Bear goes phishing in US, European high-value networks
GRU-linked crew going after our code warns Microsoft – Outlook not good Fancy Bear, the Kremlin’s cyber-spy crew, has been exploiting two previously patched bugs for large-scale phishing campaigns against high-value targets – like government, defense, and aerospace agencies in the…
CISA details twin attacks on federal servers via unpatched ColdFusion flaw
Tardy IT admins likely to get a chilly reception over the lack of updates CISA has released details about a federal agency that recently had at least two public-facing servers compromised by attackers exploiting a critical Adobe ColdFusion vulnerability.… This…
DSPM deep dive: debunking data security myths
To maintain a strong data security posture, you must protect the data where it lives Partner Content There are plenty of technology acronyms in the alphabet soup of the cybersecurity industry, but DSPM is the latest one leading the charge;…
BlackCat ransomware crims threaten to directly extort victim’s customers
Accounting software firm Tipalti says it’s investigating alleged break-in of its systems The AlphV/BlackCat ransomware group said it plans to “go direct” to the clients of a firm it allegedly attacked to extort them, claiming to have infiltrated the systems…
It’s ba-ack… UK watchdog publishes age verification proposals
Won’t somebody think of the children? The UK’s communications regulator has laid out guidance on how online services might perform age checks as part of the Online Safety Act.… This article has been indexed from The Register – Security Read…
UK government denies China/Russia nuke plant hack claim
Report suggests Sellafield compromised since 2015, response seems worryingly ignorant of Stuxnet The government of the United Kingdom has issued a strongly worded denial of a report that the Sellafield nuclear complex has been compromised by malware for years.… This…
US warns Iranian terrorist crew broke into ‘multiple’ US water facilities
There’s a war on and critical infrastructure operators are still using default passwords Iran-linked cyber thugs have exploited Israeli-made programmable logic controllers (PLCs) used in “multiple” water systems and other operational technology environments at facilities across the US, according to…
Hershey phishes! – Crooks snarf chocolate lovers’ creds
Stealing Kit Kat maker’s data?! Give me a break There’s no sugarcoating this news: The Hershey Company has disclosed cyber crooks gobbled up 2,214 people’s financial information following a phishing campaign that netted the chocolate maker’s data.… This article has…