Your cloud security must stand alone Partner Content As cloud adoption accelerates, many organizations are increasingly relying on the native security features offered by cloud service providers (CSPs). The ability to manage web application firewalls (WAF), data encryption, and key…
Category: The Register – Security
Open-source AI is a global security nightmare waiting to happen, say researchers
Also, South Korea gets a pentesting F, US Treasury says bye bye to BAH, North Korean hackers evolve, and more Infosec in Brief As if AI weren’t enough of a security concern, now researchers have discovered that open-source AI deployments…
AI security startup CEO posts a job. Deepfake candidate applies, inner turmoil ensues.
‘I did not think it was going to happen to me, but here we are’ Nearly every company, from tech giants like Amazon to small startups, has first-hand experience with fake IT workers applying for jobs – and sometimes even…
January blues return as Ivanti coughs up exploited EPMM zero-days
Consider yourselves compromised, experts warn Ivanti has patched two critical zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) product that are already being exploited, continuing a grim run of January security incidents for enterprise IT vendors.… This article has been…
Thousands more Oregon residents learn their health data was stolen in TriZetto breach
Parent company Cognizant hit with multiple lawsuits Thousands more Oregonians will soon receive data breach letters in the continued fallout from the TriZetto data breach, in which someone hacked the insurance verification provider and gained access to its healthcare provider…
Java developers want container security, just not the job that comes with it
BellSoft survey finds 48% prefer pre‑hardened images over managing vulnerabilities themselves Java developers still struggle to secure containers, with nearly half (48 percent) saying they’d rather delegate security to providers of hardened containers than worry about making their own container…
Maybe CISA should take its own advice about insider threats hmmm?
The call is coming from inside the house opinion Maybe everything is all about timing, like the time (this week) America’s lead cyber-defense agency sounded the alarm on insider threats after it came to light that its senior official uploaded…
To stop crims, Google starts dismantling residential proxy network they use to hide
The Chocolate Factory strikes again, targeting the infrastructure attackers use to stay anonymous Crims love to make it look like their traffic is actually coming from legit homes and businesses, and they do so by using residential proxy networks. Now,…
AV vendor goes to war with security shop over update server scare
eScan lawyers up after Morphisec claimed ‘critical supply-chain compromise’ A spat has erupted between antivirus vendor eScan and threat intelligence outfit Morphisec over who spotted an update server incident that disrupted some eScan customers earlier this month.… This article has…
Seven habits that help security teams reduce risk without slowing delivery
The right habits change everything Sponsored Post Security teams are under pressure from every direction: supply chain threats are rising, regulatory expectations are tightening, and development cycles aren’t getting any slower. Yet for many organizations, the practical work of improving…
ShinyHunters swipes right on 10M records in alleged dating app data grab
Extortion crew says it’s found love in someone else’s info as Match Group plays down the impact ShinyHunters has added a fresh notch to its breach belt, claiming it has pinched more than 10 million records from Match Group, a…
Patch or perish: Vulnerability exploits now dominate intrusions
Apply fixes within a few hours or face the music, say the pros What good is a fix if you don’t use it? Experts are urging security teams to patch promptly as vulnerability exploits now account for the majority of…
Cyberattack on Poland’s power grid could have turned deadly in winter cold
Close call after an apparently deliberate attempt to starve a country of energy at the worst time Cybersecurity experts involved in the cleanup of the cyberattacks on Poland’s power network say the consequences could have been lethal.… This article has…
Ransomware crims forced to take off-RAMP as FBI seizes forum
Cybercrime solved. The end Ransomware crims have just lost one of their best business platforms. US law enforcement has seized the notorious RAMP cybercrime forum’s dark web and clearnet domains.… This article has been indexed from The Register – Security…
Everybody is WinRAR phishing, dropping RATs as fast as lightning
Russians, Chinese spies, run-of-the-mill crims … Come one, come all. Everyone from Russian and Chinese government goons to financially motivated miscreants is exploiting a long-since-patched WinRAR vuln to bring you infostealers and Remote Access Trojans (RATs).… This article has been…
Fortinet unearths another critical bug as SSO accounts borked post-patch
More work for admins on the cards as they await a full dump of fixes Things aren’t over yet for Fortinet customers – the security shop has disclosed yet another critical FortiCloud SSO vulnerability.… This article has been indexed from…
Old Windows quirks help punch through new admin defenses
Google researcher sits on UAC bypass for ages, only for it to become valid with new security feature Microsoft patched a bevy of bugs that allowed bypasses of Windows Administrator Protection before the feature was made available earlier this month.……
Paranoid WhatsApp users rejoice: Encrypted app gets one-click privacy toggle
Meta also replaces a legacy C++ media-handling security library with Rust Users of Meta’s WhatsApp messenger looking to simplify the process of protecting themselves are in luck, as the company is rolling out a new feature that combines multiple security…
Let them eat sourdough: ShinyHunters claims Panera Bread as stolen credentials victim
Plus, the gang says it got in via Microsoft Entra SSO ShinyHunters says it stole several slices of data from Panera Bread, but that’s just the yeast of everyone’s problems. The extortionist gang also claims to have stolen data from…
China-linked group accused of spying on phones of UK prime ministers’ aides – for years
Reports say Salt Typhoon attackers accessed handsets of senior govt folk Chinese state-linked hackers are accused of spending years inside the phones of senior Downing Street officials, exposing private communications at the heart of the UK government.… This article has…