Category: The Register – Security

Australian spy chief fears sabotage of critical infrastructure

And accuses a former Australian politician of having ‘sold out their country’ The director general of security at Australia’s Security Intelligence Organisation (ASIO) has delivered his annual threat assessment, revealing ongoing attempts by adversaries to map digital infrastructure with a…

Palo Alto investor sues over 28% share tumble

Lawsuit alleges it misled investors with claims new AI products were ‘facilitating greater platformization’ and more Palo Alto Networks (PAN) is facing a proposed class action lawsuit that alleges investors were deceived about the traction of its platform tactics and…

China warns of fake digital currency wallets fleecing netizens

Scammers’ tactics are tiresomely familiar: get-rich-quick schemes and data harvesting China’s Ministry of Industry and Information Technology has warned local netizens that fake wallet apps for the nation’s central bank digital currency (CBDC) are already circulating and being abused by…

ALPHV/BlackCat responsible for Change Healthcare cyberattack

US government’s bounty hasn’t borne fruit as whack-a-mole game goes on The ALPHV/BlackCat ransomware gang is reportedly responsible for the massive Change Healthcare cyberattack that has disrupted pharmacies across the US since last week.… This article has been indexed from…

Everything you need to know about NIS2

Get prepared for the EU’s upgraded cybersecurity directive Webinar  The original European Union Network and Information Security (NIS) Directive certainly led to an improvement in member states’ cybersecurity defences, but it struggled to do everything required as cyberattacks and threats…

Tips on meeting complex cloud security challenges

Learn about the benefits of applying advanced automation to policy management practices Webinar  Dealing with the double trouble of relentless cyber threats and regular technology refresh cycles can stretch already overworked security practitioners. And orchestrating the transition to cloud-native applications…

Cyberattack downs pharmacies across America

Prescription orders hit after IT supplier Change Healthcare pulls plug on systems IT provider Change Healthcare has confirmed it shut down some of its systems following a cyberattack, disrupting prescription orders and other services at pharmacies across the US.… This…

Harness the power of security automation

How to ensure policy management keep up with the risks to data integrity presented by the cloud Webinar  The complexity facing businesses as they make the necessary transition to cloud-native applications and multi-cloud architectures keeps cloud teams firmly on the…

A common goal for European cyber security

Complying with the EU’s NIS2 Directive Webinar  It was growing threat levels and an increase in reported cybersecurity attacks since digitalization which pushed the European Union to introduce the original Network and Information Security (NIS) Directive in 2016.… This article…

China could be doing better at censorship, think tank finds

Complex overlapping bureaucracy sometimes lacks the funds and skills to do it right China’s censorship regime remains pervasive and far reaching, but the bureaucratic apparatus implementing it is unevenly developed and is not always well funded, according to a report…

LockBit ransomware gang disrupted by global operation

Website has been seized and replaced with law enforcement logos from eleven nations Notorious ransomware gang LockBit’s website has been taken over by law enforcement authorities, who claim they have disrupted the group’s operations and will soon reveal the extent…

Safeguarding cyber-physical systems for a smart future

A useful buyers checklist can ascertain whether solutions can meet certain sets of key requirements Sponsored Feature  Cyber-physical systems (CPS) have a vital role to play in our increasingly connected world.… This article has been indexed from The Register –…

How to weaponize LLMs to auto-hijack websites

We speak to professor who with colleagues tooled up OpenAI’s GPT-4 and other neural nets AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that enable…

Mitigating AI security risks

From APIs to Zero Trust Webinar  It has become possible to swiftly and inexpensively train, validate and deploy AI models and applications, yet while we embrace innovation, are we aware of the security risks?… This article has been indexed from…

Miscreants turn to ad tech to measure malware metrics

Now that’s what you call dual-use tech Cyber baddies have turned to ad networks to measure malware deployment and to avoid detection, according to HP Wolf Security.… This article has been indexed from The Register – Security Read the original…

QNAP vulnerability disclosure ends up an utter shambles

Two new flaws, one zero-day, countless different patches, but everything’s fine! Network-attached storage (NAS) specialist QNAP has disclosed and released fixes for two new vulnerabilities, one of them a zero-day discovered in early November.… This article has been indexed from…

The ever-present state of cyber security alert

Should you be paying more attention to securing your AI models from attack? Webinar  As artificial intelligence (AI) technology becomes increasingly complex so do the threats from bad actors. It is like a forever war.… This article has been indexed…

India to make its digital currency programmable

Reserve Bank also wants a national 2FA framework The Reserve Bank of India (RBI) announced on Thursday it would make its digital currency programmable, and ensure it can be exchanged when citizens are offline.… This article has been indexed from…

Fake LastPass lookalike made it into Apple App Store

No walled garden can keep out every weed, we suppose LastPass says a rogue application impersonating its popular password manager made it past Apple’s gatekeepers and was listed in the iOS App Store for unsuspecting folks to download and install.……