France-based victims hit especially hard, while UK named most-targeted country generally Researchers are seeing a “dramatic” increase in cybercrime involving physical violence across Europe, with at least 18 cases reported since the start of the year.… This article has been…
Category: The Register – Security
OpenAI API moonlights as malware HQ in Microsoft’s latest discovery
Redmond uncovers SesameOp, a backdoor hiding its tracks by using OpenAI’s Assistants API as a command channel Hackers have found a new use for OpenAI’s Assistants API – not to write poems or code, but to secretly control malware.… This…
China’s president Xi Jinping jokes about backdoors in Xiaomi smartphones
South Korea’s president laughed, so perhaps it was funny? Unlike China’s censorship and snooping Chinese president Xi Jinping has joked that smartphones from Xiaomi might include backdoors.… This article has been indexed from The Register – Security Read the original…
AN0M, the backdoored ‘secure’ messaging app for criminals, is still producing arrests after four years
55 cuffed last week after court ruled sting operation was legal Australian police last week made 55 arrests using evidence gathered with a backdoored messaging app that authorities distributed in the criminal community.… This article has been indexed from The…
MIT Sloan quietly shelves AI ransomware study after researcher calls BS
Even AI has doubts about the claim that ‘80% of ransomware attacks are AI-driven’ Do 80 percent of ransomware attacks really come from AI? MIT Sloan has now withdrawn a working paper that made that eyebrow-raising claim after criticism from…
AWS, Nvidia, CrowdStrike seek security startups to enter the arena
Last year’s winner scored a $65M funding round on a $300M valuation Cloud and AI security startups have two weeks to apply for a program that fast-tracks access to investors and mentors from Amazon Web Services, CrowdStrike, and Nvidia.… This…
Ransomware negotiator, pay thyself!
Rogues committed extortion while working for infosec firms A ransomware negotiator and an incident response manager at two separate cybersecurity firms have been indicted for allegedly carrying out ransomware attacks of their own against multiple US companies.… This article has…
AWS, Nvidia, Crowdstrike seek security startups to enter the arena
Last year’s winner scored a $65M funding round on a $300M valuation Cloud and AI security startups have two weeks to apply for a program that fast-tracks access to investors and mentors from Amazon Web Services, CrowdStrike, and Nvidia.… This…
Cybercrooks team up with organized crime to steal pricey cargo
Old-school cargo heists reborn in the cyber age Cybercriminals are increasingly orchestrating lucrative cargo thefts alongside organized crime groups (OCGs) in a modern-day resurgence of attacks on freight companies.… This article has been indexed from The Register – Security Read…
Metropolitan Police hails facial recognition tech after record year for arrests
But question marks remain over the tech’s biases London’s Metropolitan Police Service (MPS) says the hundreds of live facial recognition (LFR) deployments across the Capital last year led to 962 arrests, according to a new report on the controversial tech’s…
The race to shore up Europe’s power grids against cyberattacks and sabotage
Ukraine first to deploy open source security platform to isolate incidents, stop lateral movement Feature It was a sunny morning in late April when a massive power outage suddenly rippled across Spain, Portugal, and parts of southwestern France, leaving tens…
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
PLUS: Cyber-exec admits selling secrets to Russia; LastPass isn’t checking to see if you’re dead; Nation-state backed Windows malware; and more Infosec in brief Australia’s Signals Directorate (ASD) last Friday warned that attackers are installing an implant named “BADCANDY” on…
Russia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devs
Rare case of the state turning on its own, but researchers say it may be doing so more often Russia’s Interior Ministry says police have arrested three suspects it believes helped build and spread the Meduza infostealer.… This article has…
Attackers dig up $11M in Garden Finance crypto exploit
Bitcoin bridge biz offers 10 percent reward to attackers if they play nice Blockchain company Garden admits it was compromised and temporarily shut down its app after approximately $11 million worth of assets were stolen.… This article has been indexed…
Resilience, not sovereignty, defines OpenStack’s next chapter
Price hikes, politics, and platform fatigue drive organizations back toward open alternatives OpenInfra Summit Sovereignty might be the word of the hour, but the OpenStack community has another – resilience.… This article has been indexed from The Register – Security…
NHS left with sick PCs as suppliers resist Windows 11 treatment
Hospitals told to upgrade, but some medical device makers haven’t prescribed compatibility yet NHS hospitals are being blocked from fully upgrading to Windows 11 by a small number of suppliers that have yet to make their medical devices compatible with…
Europe preps Digital Euro to enter circulation in 2029
Because fewer people like banknotes, and payment sovereignty is a problem The Governing Council of the European Central Bank (ECB) has decided the bloc needs a digital version of the Euro, and ordered work that could see it enter circulation…
Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
Expired security cert, real Brussels agenda, plus PlugX malware finish the job Cyber spies linked to the Chinese government exploited a Windows shortcut vulnerability disclosed in March – but that Microsoft hasn’t fixed yet – to target European diplomats in…
Proton trains new service to expose corporate infosec cover-ups
Service will tell on compromised organizations, even if they didn’t plan on doing so themselves Some orgs would rather you not know when they’ve suffered a cyberattack, but a new platform from privacy-focused tech firm Proton will shine a light…
Docker Compose vulnerability opens door to host-level writes – patch pronto
Windows Desktop installer also fixed after DLL hijack flaw rated 8.8 severity Docker Compose users are being strongly urged to upgrade their versions of the orchestration tool after a researcher uncovered a flaw that could allow attackers to stage path…