Majority of public-facing devices still unpatched against critical vulns from as far back as 2022 More than 178,000 SonicWall firewalls are still vulnerable to years-old vulnerabilities, an infosec reseacher claims.… This article has been indexed from The Register – Security…
Category: The Register – Security
Ivanti zero-day exploits explode as bevy of attackers get in on the act
Customers still patchless and mitigation only goes so far There’s a “reasonable chance” that Ivanti Connect Secure (ICS) VPN users are already compromised if they didn’t apply the vulnerability mitigation released last week, experts say.… This article has been indexed…
China’s gambling crackdown spawned wave of illegal online casinos and crypto-crime in Asia
‘Inaccessible and autonomous armed group territories’ host crooks who use tech to launder cash, run slave scam gangs, and more Global crime networks have set up shop in autonomous territories run by armed gangs across Southeast Asia, and are using…
Thousands of Juniper Networks devices vulnerable to critical RCE bug
Yet more support for the argument to adopt memory-safe languages More than 11,500 Juniper Networks devices are exposed to a new remote code execution (RCE) vulnerability, and infosec researchers are pressing admins to urgently apply the patches.… This article has…
Patch time: Critical GitLab vulnerability exposes 2FA-less users to account takeovers
The bug with a perfect 10 severity score has been ripe for exploitation since May GitLab admins should apply the latest batch of security patches pronto given the new critical account-bypass vulnerability just disclosed.… This article has been indexed from…
FTC secures first databroker settlement banning sale of sensitive location data
Also, iOS spyware abused Apple’s own ECC, breach victim says it can’t figure out what hackers took, and some critical vulns Infosec in brief The US Federal Trade Commission has secured its first data broker settlement agreement, prohibiting X-Mode Social…
China loathes AirDrop so much it’s publicized an old flaw in Apple’s P2P protocol
Infosec academic suggests Beijing’s warning that iThing owners aren’t anonymous deserves attention outside the great firewall too In June 2023 China made a typically bombastic announcement: operators of short-distance ad hoc networks must ensure they run according to proper socialist…
Ransomware protection deconstructed
Check out the top 12 must see Rubrik product demos of 2023 for tips on how to foil attacks in 2024 Sponsored Post Rubrik has combed through its archive to find what it judges to be the top 12 must-see…
China loathes AirDrop so much it’s publicized an old flaw in Apple’s P2P protocol
Infosec academic suggests Beijing’s warning that iThing owners aren’t anonymous deserves attention outside the great firewall, too In June 2023 China made a typically bombastic announcement: operators of short-distance ad hoc networks must ensure they run according to proper socialist…
Number of orgs compromised via Ivanti VPN zero-days grows as Mandiant weighs in
Snoops had no fewer than five custom bits of malware to hand to backdoor networks Two zero-day bugs in Ivanti products were likely under attack by cyberspies as early as December, according to Mandiant’s threat intel team.… This article has…
Why we update… Data-thief malware exploits SmartScreen on unpatched Windows PCs
Phemedrone Stealer loots drives for passwords, cookies, login tokens, etc Criminals are exploiting a Windows Defender SmartScreen bypass vulnerability to infect PCs with Phemedrone Stealer, a malware strain that scans machines for sensitive information – passwords, cookies, authentication tokens, you…
This is why we update… Data-thief malware exploits unpatched Windows PCs
Phemedrone Stealer loots drives for passwords, cookies, login tokens, etc Criminals are exploiting a Windows Defender SmartScreen bypass vulnerability to infect PCs with Phemedrone Stealer, a malware strain that scans machines for sensitive information – passwords, cookies, authentication tokens, you…
Exploit for under-siege SharePoint vuln reportedly in hands of ransomware crew
It’s taken months for crims to hack together a working exploit chain Security experts claim ransomware criminals have got their hands on a functional exploit for a nearly year-old critical Microsoft SharePoint vulnerability that was this week added to the…
Secret multimillion-dollar cryptojacker snared by Ukrainian police
Criminal scored $2M in crypto proceeds but ends up in ‘cuffs following property raid The criminal thought to be behind a multimillion-dollar cryptojacking scheme is in custody following a Europol-led investigation.… This article has been indexed from The Register –…
Secure network operations for hybrid working
How to have zero trust connectivity and optimize the remote user experience Webinar Remote working has rapidly become the norm for many organizations and isn’t ever going away. But it still needs to be secure if it’s to be a…
So, are we going to talk about how GitHub is an absolute boon for malware, or nah?
Microsoft says it’s doing its best to crack down on crims The popularity of Github has made it too big to block, which is a boon to dissidents ducking government censors but a problem for internet security.… This article has…
Data regulator fines HelloFresh £140k for sending 80M+ spams
Messaging menace used text and email to bombard people Food delivery company HelloFresh is nursing a £140,000 ($178k) fine by Britain’s data privacy watchdog after a probe found it had dispatched upwards of a staggering 79 million spam email and…
While we fire the boss, can you lock him out of the network?
And he would have got away with it, too, if it weren’t for this one tiny backdoor On Call Welcome once more, dear reader, to On Call, The Register‘s weekly reader-contributed column detailing the delights and dangers of working in…
Drivers: We’ll take that plain dumb car over a flashy data-spilling internet one, thanks
Now that’s a smart move CES Despite all the buzz around internet-connected smart cars at this year’s CES in Las Vegas, most folks don’t want vehicle manufacturers sharing their personal data with third parties – and even say they’d consider…
eBay to cough up $3M after cyber-stalking couple who dared criticize the souk
Staff sent live cockroaches, porno – and more – in harassment campaign to silence pair eBay will pay $3 million to settle criminal charges that its security team stalked and harassed a Massachusetts couple in retaliation for their website’s critical…
eBay coughs up $3M for cyber-stalking couple who dared criticize the souk
Staff sent live cockroaches, porno – and more – in harassment campaign to silence pair eBay will pay $3 million to settle criminal charges that its security team stalked and harassed a Massachusetts couple in retaliation for their website’s critical…
Mandiant’s brute-forced X account exposes perils of skimping on 2FA
Speculation builds over whether a nearly year-old policy change was to blame Google-owned security house Mandiant’s investigation into how its X account was taken over to push cryptocurrency scams concludes the “likely” cause was a successful brute-force password attack.… This…
Infoseccers think attackers backed by China are behind Ivanti zero-day exploits
Customers currently left patchless while attacks are expected to increase Security experts believe Chinese nation-state attackers are actively exploiting two zero-day vulnerabilities in security products made by Ivanti.… This article has been indexed from The Register – Security Read the…
Fidelity National now says 1.3M customers had data stolen by cyber-crooks
It’s still not calling it ransomware Fidelity National Financial now says criminals got hold of data belonging to 1.3 million customers after breaking into its IT network in November.… This article has been indexed from The Register – Security Read…
Uncle Sam tells hospitals: Meet security standards or no federal dollars for you
Expect new rules in upcoming weeks US hospitals will be required to meet basic cybersecurity standards before receiving federal funding, according to rules the White House is expected to propose in the next few weeks.… This article has been indexed…
US government tells hospitals: Meet security standards or no federal dollars for you
Expect new rules in upcoming weeks US hospitals will be required to meet basic cybersecurity standards before receiving federal funding, according to rules the White House is expected to propose in the next few weeks.… This article has been indexed…
Be honest. Would you pay off a ransomware crew?
Today us vultures are debating bans on ransom payments, deplorable tactics by extortionists, and more Kettle Believe us, we wish there was a simple solution that could stop ransomware dead in its tracks for good.… This article has been indexed…
Cybercrooks play dress-up as ‘helpful’ researchers in latest ransomware ruse
Posing as cyber samaritans, scumbags are kicking folks when they’re down Ransomware victims already reeling from potential biz disruption and the cost of resolving the matter are now being subjected to follow-on extortion attempts by criminals posing as helpful security…
ShinyHunters chief phisherman gets 3 years, must cough up $5M
Sebastien Raoult developed various credential-harvesting websites over more than 2 years A key member of the ShinyHunters cybercrime group is facing three years in the slammer and being forced to return $5 million in criminal proceeds.… This article has been…
New year, new updates for security holes in Windows, Adobe, Android and more
Nothing under exploit… The calm before the storm? Patch Tuesday Microsoft rang in the New Year with a relatively calm Patch Tuesday: Just 49 Windows security updates including fixes for two critical-rated bugs, plus four high-severity Chrome flaws in Microsoft…
New year, more bugs in Windows, Adobe, Android to be fixed
Nothing under exploit… Is this the calm before the storm? Patch Tuesday Microsoft rang in the New Year with a relatively calm Patch Tuesday: Just 49 Windows security updates including fixes for two critical-rated bugs, plus four high-severity Chrome flaws…
SEC Twitter hijacked to push fake news of hotly anticipated Bitcoin ETF approval
Buy the hype, sell the, wait, what do we do now?! Breaking The SEC today said its Twitter/X account was hijacked to wrongly claim it had approved hotly anticipated Bitcoin ETFs, causing cryptocurrency to spike and then slip in price.……
New year, new bugs in Windows, Adobe, Android, more to be fixed
Nothing under exploit… Is this the calm before the storm? Patch Tuesday Microsoft rang in the New Year with a relatively calm Patch Tuesday: Just 49 Windows security updates including fixes for two critical-rated bugs, plus four high-severity Chrome flaws…
SEC Twitter hijacked to push fake news of hotly anticipated ETF approval
Buy the hype, sell the, wait, what do we do now?! Breaking The SEC today said its Twitter account was hijacked to wrongly claim it had approved hotly anticipated Bitcoin ETFs, causing cryptocurrency to spike and then slip in price.……
And that’s a wrap for Babuk Tortilla ransomware as free decryptor released
Experts’ job made ‘straightforward’ by crooks failing to update encryption schema after three years Security researchers have put out an updated decryptor for the Babuk ransomware family, providing a free solution for victims of the Tortilla variant.… This article has…
Apache OFBiz zero-day pummeled by exploit attempts after disclosure
Issue has been patched so be sure to check your implementations SonicWall says it has observed thousands of daily attempts to exploit an Apache OFBiz zero-day for nearly a fortnight.… This article has been indexed from The Register – Security…
British Library: Finances remain healthy as ransomware recovery continues
Authors continue to lose out on owed payments as rebuild of digital services drags on The British Library is denying reports suggesting the recovery costs for its 2023 ransomware attack may reach highs of nearly $9 million as work to…
Facebook, Instagram now mine web links you visit to fuel targeted ads
Also: Twitter hijackings, BEC arrest, and critical vulnerabilities Infosec in brief We gather everyone’s still easing themselves into the New Year. Deleting screens of unread emails, putting on a brave face in meetings, and slowly getting up to speed. While…
Ransomware payment ban: Wrong idea at the wrong time
Won’t stop the chaos, may lead to attacks with more dire consequences Opinion A general ban on ransomware payments, as was floated by some this week, sounds like a good idea. Eliminate extortion as a source of criminal income, and…
After injecting cancer hospital with ransomware, crims threaten to swat patients
Remember the good old days when ransomware crooks vowed not to infect medical centers? Extortionists are now threatening to swat hospital patients — calling in bomb threats or other bogus reports to the police so heavily armed cops show up…
After crippling cancer hospital with ransomware, crims threaten to swat patients
Remember the good old days when ransomware crooks vowed not to infect medical centers? Extortionists are now threatening to swat hospital patients — calling in bomb threats or other bogus reports to the police so heavily armed cops show up…
BreachForums boss busted for bond blunders – including using a VPN
Fitzpatrick faces potentially decades in prison later this month, so may as well get some foreign Netflix in beforehand The cybercriminal behind BreachForums was this week arrested for violating the terms of his pretrial release and will now be held…
Sandworm’s Kyivstar attack should serve as a reminder of the Kremlin crew’s ‘global reach’
‘Almost everything’ wiped in the telecom attack, says Ukraine’s top cyber spy Russia’s Sandworm crew appear to have been responsible for knocking out mobile and internet services to about 24 million users in Ukraine last month with an attack on…
X-ploited: Mandiant restores hijacked Twitter account after attempted crypto heist
Miscreants mock Google-owned security house: ‘Change password please’ Miscreants took over security giant Mandiant’s Twitter account for several hours on Wednesday in an attempt to steal cryptocurrency, then trolled the Google-owned security shop, telling its admins to change the password.……
X marks the spot: Mandiant restores hijacked Twitter account after attempted crypto heist
Miscreants mock Google-owned security house: ‘Change password please’ Miscreants took over security giant Mandiant’s Twitter account for several hours on Wednesday in an attempt to steal cryptocurrency, then trolled the Google-owned security shop, telling its admins to change the password.……
Infosec experts divided over 23andMe’s ‘victim-blaming’ stance on data breach
Users apparently at fault after reusing credentials the company didn’t check were already compromised 23andMe users’ godawful password practices were supposedly to blame for the biotech company’s October data disaster, according to its legal reps.… This article has been indexed…
Infostealer malware, weak password leaves Orange Spain RIPE for plucking
No 2FA or special characters to prevent database takeover and BGP hijack A weak password exposed by infostealer malware is being blamed after a massive outage at Orange Spain disrupted around half of its network’s traffic.… This article has been…
As lawmakers mull outlawing poor security, what can they really do to tackle online gangs?
Headline-grabbing takedowns are nice, but long-term solutions require short-term sacrifices Comment In some ways, the ransomware landscape in 2023 remained unchanged from the way it looked in previous years. Vendor reports continue to show a rise in attacks, major organizations…
Three Chinese balloons float near Taiwanese airbase
Also: Remember that balloon over the US last February? It might have used a US internet provider Four Chinese balloons have reportedly floated over the Taiwan Strait, three of them crossing over the island’s land mass and near its Ching-Chuan-Kang…
Microsoft kills off Windows app installation from the web, again
Unpleasant Christmas package lets malware down the chimney Microsoft has disabled a protocol that allowed the installation of Windows apps after finding that miscreants were abusing the mechanism to install malware.… This article has been indexed from The Register –…
Freight giant Estes refuses to deliver ransom, says personal data opened and stolen
Pay up, or just decline to submit One of America’s biggest private freight shippers, Estes Express Lines, has told more than 20,000 customers that criminals stole their personal information.… This article has been indexed from The Register – Security Read…
Atos confirms talks with Airbus over cybersecurity wing sale
IT service company’s latest move to clear its maturing debts French IT services provider Atos has entered talks with Airbus to sell its tech security division in an effort to ease its financial burdens.… This article has been indexed from…
Copy that? Xerox confirms ‘security incident’ at subsidiary
Company’s removal from ransomware gang’s leak blog could mean negotiations underway Xerox has officially confirmed that a cyber baddie broke into the systems of its US subsidiary – a week after INC Ransom claimed to have exfiltrated data from the…
Formal ban on ransomware payments? Asking orgs nicely to not cough up ain’t working
With the average demand hitting $1.5 million, something’s gotta change Emsisoft has called for a complete ban on ransom payments following another record-breaking year of digital extortion.… This article has been indexed from The Register – Security Read the original…
Google password resets not enough to stop these info-stealing malware strains
Now every miscreant is jumping on Big G’s OAuth account security hole Security researchers say info-stealing malware can still access victims’ compromised Google accounts even after passwords have been changed.… This article has been indexed from The Register – Security…
Court hearings become ransomware concern after justice system breach
From legal proceedings to potential YouTube fodder The court system of Victoria, Australia, was subject to a suspected ransomware attack in which audiovisual recordings of court hearings may have been accessed.… This article has been indexed from The Register –…
CEO arranged his own cybersecurity, with predictable results
Cleaning up after hackers is easy compared to surviving the politics of consultancy On Call It’s the last Friday of 2023, but because the need for tech support never goes away neither does On Call, The Register’s Friday column in…
A tale of 2 casino ransomware attacks: One paid out, one did not
What can be learned from MGM’s and Caesars’ infosec moves Feature The same cybercrime crew broke into two high-profile Las Vegas casino networks over the summer, infected both with ransomware, and stole data belonging to tens of thousands of customers…
Kaspersky reveals previously unknown hardware ‘feature’ used in iPhone attacks
‘This is no ordinary vulnerability’ sec pros explain Kaspersky’s Global Research and Analysis Team (GReAT) has exposed a previously unknown ‘feature’ in Apple iPhones that allows attackers to bypass hardware-based memory protection.… This article has been indexed from The Register…
Iranian cyberspies target US defense orgs with a brand new backdoor
Also: International cops crackdown on credit card stealers and patch these critical vulns Iranian cyberspies are targeting defense industrial base organizations with a new backdoor called FalseFont, according to Microsoft.… This article has been indexed from The Register – Security…
Cyber sleuths reveal how they infiltrate the biggest ransomware gangs
How do you break into the bad guys’ ranks? Master the lingo and research, research, research Feature When AlphV/BlackCat’s website went dark this month, it was like Chrimbo came early for cybersecurity defenders, some of whom seemingly believed law enforcement…
Lapsus$ teen sentenced to indefinite detention in hospital after Nvidia, GTA cyberattacks
Arion Kurtaj will remain hospitalized until a mental health tribunal says he can leave Two British teens who were members of the Lapsus$ gang have been sentenced for their roles in a cyber-crime spree that included compromising Uber, Nvidia, and…
Four in five Apache Struts 2 downloads are for versions featuring critical flaw
Seriously, people – please check the stuff you fetch more carefully Security vendor Sonatype believes developers are failing to address the critical remote code execution (RCE) vulnerability in the Apache Struts 2 framework, based on recent downloads of the code.……
Mozilla decides Trusted Types is a worthy security feature
DOM-XSS attacks have become scarce on Google websites since TT debuted Mozilla last week revised its position on a web security technology called Trusted Types, which it has decided to implement in its Firefox browser.… This article has been indexed…
Data loss prevention isn’t rocket science, but NASA hasn’t made it work in Microsoft 365
Privacy review finds breach response plan is a mess, training could be better, but protection regime mostly holds up NASA’s Office of Inspector General has run its eye over the aerospace agency’s privacy regime and found plenty to like –…
Something nasty injected login-stealing JavaScript into 50K online banking sessions
Why keeping your PC secure and free of malware remains paramount IBM Security has dissected some JavaScript code that was injected into people’s online banking pages to steal their login credentials, saying 50,000 user sessions with more than 40 banks…
Cybercrooks book a stay in hotel email inboxes to trick staff into spilling credentials
Research highlights how major attacks like those exploiting Booking.com are executed Cybercriminals are preying on the inherent helpfulness of hotel staff during the sector’s busy holiday season.… This article has been indexed from The Register – Security Read the original…
Manchester’s finest drowning in paperwork as Freedom of Information requests pile up
Enforcement notice issued months after data regulator schooled police force Greater Manchester Police (GMP) must clear the backlog of hundreds of Freedom of Information (FOI) Act requests – some years old – or find itself in contempt of court.… This…
SSH shaken, not stirred by Terrapin vulnerability
No need to panic, but grab those updates or mitigations anyway just to be safe A vulnerability in the SSH protocol can be exploited by a well-placed adversary to weaken the security of people’s connections, if conditions are right.… This…
Philippines, South Korea, Interpol cuff 3,500 suspected cyber scammers, seize $300M
Alleged crims used AI to pose as friends, family, romantic partners – and sold dodgy NFTs A transnational police operation has resulted in the arrest of 3,500 alleged cybercriminals and the seizure of $300 million in cash and digital assets.……
Millions of Xfinity customers’ info, hashed passwords feared stolen in cyberattack
35M-plus Comcast user IDs accessed by intruder via Citrix Bleed Millions of Comcast Xfinity subscribers’ personal data – including potentially their usernames, hashed passwords, contact details, and secret security question-answers – was likely stolen by one or more miscreants exploiting…
Before you go away for Xmas: You’ve patched that critical Perforce Server hole, right?
Microsoft bug hunters highlight weaknesses in source-wrangling suite Four vulnerabilities in Perforce Helix Core Server, including one critical remote code execution bug, should be patched “immediately,” according to Microsoft, which spotted the flaws and disclosed them to the software vendor.……
AlphV/BlackCat hits back as Feds offer decryptor to ransomware victims
Domain seized while gang shrugs at loss of ‘stupid old key’ The US Justice Department is passing a decryptor to more than 500 victims of AlphV/BlackCat’s ransomware following a disruption campaign.… This article has been indexed from The Register –…
AlphV/BlackCat hacked back as feds offer decryptor to ransomware victims
Domain seized while gang shrugs at loss of ‘stupid old key’ The US Justice Department is passing a decryptor to more than 500 victims of AlphV/BlackCat’s ransomware following a disruption campaign.… This article has been indexed from The Register –…
Qakbot’s backbot: FBI-led takedown keeps crims at bay for just 3 months
Experts say malware strain make take years to die off completely Multiple sources are confirming the resurgence of Qakbot malware mere months after the FBI and other law enforcement agencies shuttered the Windows botnet.… This article has been indexed from…
Hacktivists boast: We shut down Iran’s gas pumps today
Predatory Sparrow previously knocked out railways and a steel plant Hacktivists reportedly disrupted services at about 70 percent of Iran’s gas stations in a politically motivated cyberattack.… This article has been indexed from The Register – Security Read the original…
Mr Cooper cyberattack laid bare: 14.7M people’s info stolen, costs hit $25M
Mortgage lender says no evidence of identity theft (yet) after SSNs, DoBs, addresses, more swiped Mortgage lender Mr Cooper has now admitted almost 14.7 million people’s private information, including addresses and bank account numbers, were stolen in an earlier IT…
Cyber-crooks slip into Vans, trample over operations
IT systems encrypted, personal data pilfered from North Face parent, we’re told A digital break-in has disrupted VF Corp’s operations and its ability to fulfill orders, according to the apparel and footwear giant.… This article has been indexed from The…
National Grid latest UK org to zap Chinese kit from critical infrastructure
Move reportedly made after consulting with National Cyber Security Centre The National Grid is reportedly the latest organization in the UK to begin pulling China-manufactured equipment from its network over cybersecurity fears.… This article has been indexed from The Register…
MongoDB warns breach of internal systems exposed customer contact info
PLUS: Cancer patients get ransom notes for Christmas, Delta Dental is the latest MOVEit victim, and critical vulns Infosec in brief MongoDB on Saturday issued an alert warning of “a security incident involving unauthorized access to certain MongoDB corporate systems,…
Pro-China campaign targeted YouTube with AI avatars
PLUS: Beijing wants ten-minute reporting of infosec incidents; Infosys CFO bails; TikTok’s Indonesia comeback approved, for now Think tank Australian Strategic Policy Institute (ASPI) last week published details of a campaign that spreads English language pro-China and anti-US narratives on…
Hundreds of thousands of dollars in crypto stolen after Ledger code poisoned
NPM repo hijacked after former worker phished Cryptocurrency wallet maker Ledger says someone slipped malicious code into one of its JavaScript libraries to steal more than half a million dollars from victims.… This article has been indexed from The Register…
Kraft Heinz suggests we simmer down about Snatch ransomware attack claims
Ah, beans The Kraft Heinz Company says its systems are all up and running as usual as it probes claims that some of its data was stolen by ransomware crooks.… This article has been indexed from The Register – Security…
NKabuse backdoor harnesses blockchain brawn to hit several architectures
Novel malware adapts delivers DDoS attacks and provides RAT functionality Incident responders say they’ve found a new type of multi-platform malware abusing the New Kind of Network (NKN) protocol.… This article has been indexed from The Register – Security Read…
To BCC or not to BCC – that is the question data watchdog wants answered
The dos and don’ts of bulk emailing A data regulator has reminded companies they need to take care while writing emails to avoid unintentionally blurting out personal data.… This article has been indexed from The Register – Security Read the…
Microsoft seizes websites used to sell phony email accounts to Scattered Spider and other crims
That should solve the global cybercrime problem, right? Microsoft has taken down US-based infrastructure and websites used by a cybercrime group to sell fraudulent online accounts to other crooks including Scattered Spider, the infamous social-engineering and extortion crew that hacked…
Russia joins North Korea in sending state-sponsored cyber troops to pick on TeamCity users
National security and infosec authorities band together to help victims sniff out stealthy Russian baddies hiding in networks The offensive cyber unit linked to Russia’s Foreign Intelligence Service (SVR) is exploiting the critical vulnerability affecting the JetBrains TeamCity CI/CD server…
Money-grubbing crooks abuse OAuth – and baffling absence of MFA – to do financial crimes
Business email compromise, illicit cryptomining, phishing … if it makes a dollar, this lot do it Multiple miscreants are misusing OAuth to automate financially motivated cyber crimes – such as business email compromise (BEC), phishing, large-scale spamming campaigns – and…
Surprise! Email from personal.
information.reveal@gmail.com is not going to contain good news
Internet plod highlight tactics used by cruel Karakurt crime gang Karakurt, a particularly nasty extortion gang that uses “extensive harassment” to pressure victims into handing over millions of dollars in ransom payments after compromising their IT infrastructure, pose a “significant…
The SANS Holiday Hack Challenge is back!
Skip the sleigh and sail with Santa in this year’s fun, hands-on SANS cybersecurity event Webinar Whether you are considering a career in cyber security or you already work in the industry, the 2023 SANS Holiday Hack Challenge is a…
Learning the safety language of the cloud
Protecting your cloud from cyber security threats starts by understanding what it’s telling you Webinar In China, clouds are a symbol of luck. See multiple layering of clouds in a blue sky can mean you are in line to receive…
Nearly a million non-profit donors’ details left exposed in unsecured database
Trusted by major charities, DonorView publicly exposed children’s names and addresses, among other data Close to a million records containing personally identifiable information belonging to donors that sent money to non-profits were found exposed in an online database.… This article…
Cyber security isn’t simple, but it could be
The biggest problem is a tendency to ignore problems you can’t see or haven’t looked for, says SecurityHQ Sponsored Feature Most experts agree cybersecurity is now so complex that managing it has become a security problem in itself.… This article…
Think tank report labels NSO, Lazarus, as ‘cyber mercenaries’
Sure, they do crimes. But the plausible deniability governments adore means they deserve a different label Cybercrime gangs like the notorious Lazarus group and spyware vendors like Israel’s NSO should be considered cyber mercenaries – and become the subject of…
Final Patch Tuesday of 2023 goes out with a bang
Microsoft fixed 36 flaws. Adobe addressed 212. Apple, Google, Cisco, VMware and Atlassian joined the party It’s the last Patch Tuesday of 2023, which calls for celebration – just as soon as you update Windows, Adobe, Google, Cisco, FortiGuard, SAP, VMware,…
Cloud engineer wreaks havoc on bank network after getting fired
Now he’s got two years behind bars to think about his bad choices An ex-First Republic Bank cloud engineer was sentenced to two years in prison for causing more than $220,000 in damage to his former employer’s computer network after…
Discord in the ranks: Lone Airman behind top-secret info leak on chat platform
Poor cybersecurity hygiene in the military? Surely not! There was only one US Air National Guardsman behind the leak of top-secret US military documents on Discord, but his chain of command bears some responsibility for letting it happen on their…
Northern Ireland cops count human cost of August data breach
Officers potentially targeted by dissidents can’t afford to relocate for their safety, while others seek support to change their names An official review of the Police Service of Northern Ireland’s (PSNI) August data breach has revealed the full extent of…
BlackBerry squashes plan to spin out its IoT biz
Board and incoming CEO decide reorganizing is better than splitting BlackBerry has decided its plan to split into two separate companies is not a good idea and will instead reorganize itself into two independent divisions.… This article has been indexed…
Interpol moves against human traffickers who enslave people to scam you online
Scum lure folks with promises of good jobs in crypto and then won’t let them leave Hundreds of suspected people smugglers have been arrested, and 163 potential victims rescued from servitude, as part of an Interpol-coordinated operation dubbed “Turquesa V”…