Details of civilians and Garda officers were included, as well as high-res scans of identity documents A third-party contractor running a database without password protection exposed more than 500,000 records related to vehicle seizures by the Irish National Police (An…
Category: The Register – Security
Helping you bridge the cloud security gap
Learn how to implement effective identity and access management with Entra ID and SANS Sponsored Post The job of the cyber security professional is never easy, and it gets progressively harder with the movement of sensitive data and applications across…
Scammers use India’s real-time payment system to siphon off money, send it to China
Countries signed on for India’s stack might watch out China-based scammers are using a combination of fake loan apps and India’s real-time mobile payment system, Unified Payments Interface (UPI), to separate victims from their cash, according to a report by…
Cisco fixes critical IOS XE bug but malware crew way ahead of them
Initial fall in infected devices indicates evolution, not extinction, of attack code After a six-day wait, Cisco started rolling out a patch for a critical bug that miscreants had exploited to install implants in thousands of devices. Alas, it seems…
DC elections agency warns entire voting roll may have been stolen
Home of the Republic seemingly hit by Sony/NTT Docomo ransomware crew The US Capitol’s election agency says a ransomware crew might have stolen its entire voter roll, which includes the personal information of all registered voters in the District of…
Redefining united data protection
Where adopting a resilient and integrated approach to backup and disaster recovery makes sense Webinar There is no longer an off button for businesses and organizations, no closed signs, or downtime. This means enterprise IT operations and data assets must…
Microsoft opens early access to AI assistant for infosec, Security Copilot
Copilotization of all things continues… as helper offers incident reports to share with the boss and more Microsoft is opening up the early access program for its flagship cybersecurity AI product, which marks the inevitable folding in of Copilot into…
Admin behind E-Root stolen creds souk extradited to US
There was a young man from Moldova, who the Feds just want to roll over, but with 20 inside, and nowhere to hide, he just wants it all to be over A Moldovan who allegedly ran the compromised-credential marketplace E-Root…
Casio keyed up after data loss hits customers in 149 countries
Crooks broke into the ClassPad server and swiped online learning database Japanese electronics giant Casio said miscreants broke into its ClassPad server and stole a database with personal information belonging to customers in 149 countries.… This article has been indexed…
Europol knocks RagnarLocker offline in second major ransomware bust this year
Group will be remembered as staunch negotiator and a bullier of critical infrastructure orgs Law enforcement agencies have taken over RagnarLocker ransomware group’s leak site in an internationally coordinated takedown.… This article has been indexed from The Register – Security…
Cybercrim claims fresh 23andMe batch takes leaked records to 5 million
Class action lawsuits abound after mega breach A cybercriminal claims they’ve uploaded a second batch of stolen profile data from biotech company 23andMe, posting it to the same cybercrime forum that hosted the first batch two weeks ago.… This article…
Ex-Navy IT manager gets 5 years in slammer for 2018 database heist
Seafaring cybercrim’s wife faces similar sentence next month A former IT manager for the US Navy is facing a five-and-a-half year prison sentence for selling thousands of people’s personal records on the dark web.… This article has been indexed from…
October Cybersecurity Awareness Month to target internal security risks
SANS offers cyber security pros a valuable toolkit of resources to mitigate the potentially serious cybersecurity risks faced by internal staff Sponsored Post Organisations that fail to adequately address the potential vulnerabilities that internal employees sometimes encounter when developing an…
D-Link clears up ‘exaggerations’ around data breach
Who knew 3 million actually means 700 in cybercrime forum lingo? D-Link has confirmed suspicions that it was successfully targeted by cyber criminals, but is talking down the scale of the impact.… This article has been indexed from The Register…
CIA exposed to potential intelligence interception due to X’s URL bug
Musk’s mega-app-in-waiting goes from chopping headlines to profile URLs An ethical hacker has exploited a bug in the way X truncates URLs to take over a CIA Telegram channel used to receive intelligence.… This article has been indexed from The…
US cybercops urge admins to patch amid ongoing Confluence chaos
Do it now, no ifs or buts, says advisory US authorities have issued an urgent plea to network admins to patch the critical vulnerability in Atlassian Confluence Data Center and Server amid ongoing nation-state exploitation.… This article has been indexed…
British boffins say aircraft could fly on trash, cutting pollution debt by 80%
Domestic jets can use ‘municipal solid waste’ to fly the friendly skies Sustainable aviation fuels (SAFs) made from sources other than fossil fuels have the potential to reduce emissions by up to 80 percent, UK researchers have found.… This article…
Will you meet the directive?
Your guide to SEC, DoD 8140.3 and NIS2 changes with the SANS Cyber Compliance Countdown Sponsored Post Imminent changes to cyber security regulations in the US and Europe demand that public and private sector organizations on both side of the…
We’re not in e-Kansas anymore: State courts reel from ‘unauthorized incursion’
Fax, post, and human messengers can still be used for filing vital evidence An unspecified security incident is forcing many state courts across Kansas to rely on paper filings, and it may have continue to do so for weeks, a…
BLOODALCHEMY provides backdoor to southeast Asian nations’ secrets
Sophisticated malware devs believed to be behind latest addition to toolset of China-aligned attackers Security researchers have uncovered a backdoor used in attacks against governments and organizations in the Association of Southeast Asian Nations (ASEAN).… This article has been indexed…
Regulator, insurers and customers all coming for Progress after MOVEit breach
Also, CISA cataloging new ransomware data points, 17k WP sites hijacked by malware in Sept., and more critical vulns Infosec in brief The fallout from the exploitation of bugs in Progress Software’s MOVEit file transfer software continues, with the US…
Thwarted ransomware raid targeting WS_FTP servers demanded just 0.018 BTC
Early attempt to exploit latest Progress Software bug spotted in the wild An early ransomware campaign against organizations by exploiting the vulnerability in Progress Software’s WS_FTP Server was this week spotted by security researchers.… This article has been indexed from…
530K people’s info feared stolen from cloud PC gaming biz Shadow
Will players press start to continue with this outfit? Shadow, which hosts Windows PC gaming in the cloud among other services, has confirmed criminals stole a database containing customer data following a social-engineering attack against one of its employees.… This…
Calls for Visual Studio security tweak fall on deaf ears despite one-click RCE exploit
Two years on and Microsoft refuses to address the issue Perceived weaknesses in the security of Microsoft’s Visual Studio IDE are being raised once again this week with a fresh single-click exploit.… This article has been indexed from The Register…
Can open source be saved from the EU’s Cyber Resilience Act?
The road to Hell is paved with good intentions, and for open source this is a well meaning cluster fudge Opinion When I was in Bilbao recently for the Open Source Summit Europe event, the main topic of conversation was…
Equifax scores £11.1M slap on wrist over 2017 mega breach
Not quite a pound for every one of the 13.8 million affected UK citizens, and it could have been more The UK’s Financial Conduct Authority (FCA) has fined Equifax a smidge over £11 million ($13.6 million) for severe failings that…
Squid games: 35 security holes still unpatched in proxy after 2 years, now public
We’d like to say don’t panic … but maybe? 35 vulnerabilities in the Squid caching proxy remain unfixed more than two years after being found and disclosed to the open source project’s maintainers, according to the person who reported them.……
Building cyber resilience with data vaults
How continuous data protection and isolated cyber recovery vaults provide effective defense against ransomware Sponsored Feature In August 2023, Danish hosting subsidiaries CloudNordic and AzeroCloud were on the receiving end of one of the most serious ransomware attacks ever made…
Everest cybercriminals offer corporate insiders cold, hard cash for remote access
The ransomware gang changes identities more than Jason Bourne The Everest ransomware group is stepping up its efforts to purchase access to corporate networks directly from employees amid what researchers believe to be a major transition for the cybercriminals.… This…
US construction giant unearths concrete evidence of cyberattack
Simpson Manufacturing yanks systems offline, warns of ongoing disruption Simpson Manufacturing Company yanked some tech systems offline this week to contain a cyberattack it expects will “continue to cause disruption.”… This article has been indexed from The Register – Security…
HM Government has partnered with SANS to train cyber security experts
Partner Content According to the Cyber Security Breaches Survey 26 percent of medium businesses, 37 percent of large businesses and 25 percent of high-income charities have experienced cyber crime in the last 12 months.… This article has been indexed from…
US Navy sailor admits selling secret military blueprints to China for $15K
Worth it for 20 years behind bars? A US Navy service member pleaded guilty yesterday to receiving thousands of dollars in bribes from a Chinese spymaster in exchange for passing on American military secrets.… This article has been indexed from…
CISOs’ salary growth slows – with pay gap widening
We still doubt any infosec leaders will be going without heating this winter The gap between the top and bottom-earning CISOs is growing wider, with the highest-paid execs having their salaries increased at three times the rate of those at…
From chaos to cadence: Celebrating two decades of Microsoft’s Patch Tuesday
IT folks look back on 20 years of what is now infosec tradition Feature Twenty years ago this month, Microsoft did something pretty revolutionary at the time when it formalized the Windows software release schedule.… This article has been indexed…
What to expect when the UK-US Data Bridge comes into force this week
Britain’s privacy watchdog still not happy that agreement ‘appropriately’ protects sensitive data Opinion The UK Extension to the EU-US Data Privacy Framework (aka Data Bridge) will enter into force on October 12, allowing certifying entities to easily transfer personal data…
curl vulnerabilities ironed out with patches after week-long tease
The coordinated disclosure didn’t quite go to plan, though After a week of rampant speculation about the nature of the security issues in curl, the latest version of the command line transfer tool was finally released today.… This article has…
DoJ: Ex-soldier tried to pass secrets to China after seeking a ‘subreddit about spy stuff’
FBI agent claims sergeant with top clearance offered access to DoD tech systems A former US Army Sergeant with Top Secret US military clearance created a Word document entitled “Important Information to Share with Chinese Government,” according to an FBI…
Hacktivist attacks erupt in Middle East following Hamas assault on Israel
Groups range from known collectives to new outfits eager to raise their profile Hacktivism efforts have proliferated rapidly in the Middle East following the official announcement of a war between Palestine and Israel.… This article has been indexed from The…
Datacenter cabling biz Volex confirms digital break-in
All sites operational, no ‘material’ financial impact expected but stock markets still worried Volex, the British integrated maker of critical power and data transmission cables, confirmed this morning that intruders accessed data after breaking into its tech infrastructure.… This article…
Chinese smart TV boxes infected with malware in PEACHPIT ad fraud campaign
PLUS: Sony admits to MoveITbreach; Blackbaud fined again, Qakbot’s sorta back from the dead; and more Infosec in brief Bot defense software vendor Human Security last week detailed an attack that “sold off-brand mobile and Connected TV (CTV) devices on…
CISA reveals ‘Admin123’ as top security threat in cyber sloppiness chart
Calls for wider adoption of security-by-design principles continue to ring loudly from Uncle Sam The US Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) are blaming unchanged default credentials as the prime security misconfiguration that leads…
MGM Resorts attackers hit personal data jackpot, but house lost $100M
Racecars and cyber insurance will balance its books in no time, though MGM Resorts has admitted that the cyberattack it suffered in September will likely cost the company at least $100 million.… This article has been indexed from The Register…
CDW data to be leaked next week after negotiations with LockBit break down
Ransomware spokesperson scoffs at IT reseller’s offer of payment CDW, one of the largest resellers on the planet, will have its data leaked by LockBit after negotiations over the ransom fee broke down, a spokesperson for the cybercrime gang says.……
How to stop ransomware thieves WORMing their way into your data
Stay immutable in the face of cyber crime adversity, says Object First Sponsored Feature Most of us dislike cyber criminals, but not many of us dislike them quite as much as Anthony Cusimano.… This article has been indexed from The…
Google promises Germany to creep on users less after market power probe
Regulation complements EU’s Digital Markets Act to cover more services Google has committed to being a little less creepy with user data in response to proceedings from the German Federal Cartel Office (Bundeskartellamt).… This article has been indexed from The…
GoldDigger Android trojan targets Vietnamese banking apps, code contains hints of wider targets
More malware scum using acessibility features to steal personal info Singapore-based infosec outfit Group-IB on Thursday released details of a new Android trojan that exploits the operating system’s accessibility features to steal info that enables theft of personal information.… This…
Cisco warns of critical flaw in Emergency Responder code
Hard-coded credentials strike again Cisco has issued a security advisory about a vulnerability in its Emergency Responder software that would allow an unauthenticated remote attacker to log in to an affected device using the root account.… This article has been…
Another security update, Apple? You’re really keeping up with your tech rivals
Zero day? More like every day, amirite? Apple has demonstrated that it can more than hold its own among the tech giants, at least in terms of finding itself on the wrong end of zero-day vulnerabilities.… This article has been…
BYOD should stand for bring your own disaster, according to Microsoft ransomware data
Rising number of RaaS baddies drive global attack numbers up 200% Microsoft research says that 80-90 percent of ransomware attacks over the past year originated from unmanaged devices.… This article has been indexed from The Register – Security Read the…
Lorenz ransomware crew bungles blackmail blueprint by leaking two years of contacts
Data leakers become data leakees The Lorenz ransomware group leaked the details of every person who contacted it via its online contact form over the course of the last two years.… This article has been indexed from The Register –…
South Korea accuses North of Phish and Ships attack
Kim Jong-un looks at industry’s progress with green eyes, says South Korea’s spy agency South Korea’s National Intelligence Service (NIS) has warned North Korea is attacking its shipbuilding sector.… This article has been indexed from The Register – Security Read…
North Korea goes phishing in South’s shipyards
Kim Jong-un looks at industry’s progress with green eyes, says South Korea’s spy agency South Korea’s National Intelligence Service (NIS) has warned North Korea is attacking its shipbuilding sector.… This article has been indexed from The Register – Security Read…
IT networks under attack via critical Confluence zero-day. Patch now
‘Handful’ of customers hit so far, public-facing instances at risk Atlassian today said miscreants have exploited a critical bug in on-premises instances of Confluence Server and Confluence Data Center to create and abuse admin accounts within the enterprise colab software. ……
Make-me-root ‘Looney Tunables’ security hole on Linux needs your attention
What’s up, Doc? Try elevated permissions Grab security updates for your Linux distributions: there’s a security hole that can be fairly easily exploited by rogue users, intruders, and malicious software to gain root access and take over the box.… This…
‘Gay furry hackers’ brag of second NATO break-in, steal and leak more data
‘No impact on missions,’ military powerhouse insists NATO is “actively addressing” multiple IT security incidents after a hacktivist group claimed it once again breached some of the military alliance’s websites, this time stealing what’s claimed to be more than 3,000…
CISA barred from coordinating with social media sites to police misinformation
The 5th Circuit’s re-ruling adds CISA to a list of alleged first-amendment violators. Next stop: Supreme Court The US Fifth Circuit Court of Appeals has modified a ruling from last month to add the Cybersecurity and Infrastructure Security Agency (CISA)…
Red Cross lays down hacktivism law as Ukraine war rages on
Rules apply to cyber vigilantes and their home nations, but experts cast doubt over potential benefits New guidelines have been codified to govern the rules of engagement concerning hacktivists involved in ongoing cyber warfare.… This article has been indexed from…
Trio of TorchServe flaws means PyTorch users need an urgent upgrade
Meta, the project’s maintainer, shrugs A trio of now-patched security issues in TorchServe, an open-source tool for scaling PyTorch machine-learning models in production, could lead to server takeover and remote code execution (RCE), according to security researchers.… This article has…
US v Sam Bankman-Fried trial begins … as imploded crypto-biz boss sues his insurer
After people’s funds go up in smoke, ex-CEO seeks cash to foot legal bills The first of two US government prosecutions of former FTX CEO Sam Bankman-Fried commenced in New York on Monday, only a day after the cryptocurrency tycoon…
CISA adds latest Chrome zero-day to Known Exploited Vulnerabilities Catalog
Chrome’s second zero-day of the month puts fed security at ‘significant risk’ The US’s Cybersecurity and Infrastructure Security Agency (CISA) has added the latest actively exploited zero-day vulnerability affecting Google Chrome to its Known Exploited Vulnerabilities (KEV) Catalog.… This article…
Co-founder of collapsed crypto biz Three Arrows cuffed at airport
Plus: Philippine state health insurance knocked offline by ransomware, China relaxes data export laws, and more Asia in brief Zhu Su, co-founder of fallen crypto business Three Arrows Capital (3AC), was arrested last Friday at Changi Airport in Singapore as…
Feds hopelessly behind the times on ransomware trends in alert to industry
Better late than never, we guess An urgent ransomware warning from the Feds has some industry analysts scratching their heads and wondering if Uncle Sam’s noggin has been buried in the sand for too long.… This article has been indexed…
Security researchers believe mass exploitation attempts against WS_FTP have begun
Early signs emerge after Progress Software said there were no active attempts last week Security researchers have spotted what they believe to be a “possible mass exploitation” of vulnerabilities in Progress Software’s WS_FTP Server.… This article has been indexed from…
AWS stirs the MadPot – busting bot baddies and eastern espionage since 2010
Security exec Mark Ryland spills the tea on hush-hush threat intel tool Interview AWS has unveiled MadPot, its previously secret threat-intelligence tool that one of the cloud giant’s security execs tells us has thwarted Chinese and Russian spies – and…
Yes, Singapore immigration plans to scan your face instead of your passport
No, that does not mean you can leave it at home just yet Last week the internet was abuzz with talk that Singapore’s commercial Changi airport was no longer going to require passports for clearance at immigration. Although it is…
Now MOVEit maker Progress patches holes in WS_FTP
Plus: Johnson Controls hit by IT ‘incident’, Exim and Chrome security updates, and more Infosec in brief Progress Software, maker of the mass-exploited MOVEit document transfer tool, is back in the news with more must-apply security patches, this time for…
Microsoft Bing Chat pushes malware via bad ads
From AI to just plain aaaiiiee! Microsoft introduced its Bing Chat AI search assistant in February and a month later began serving ads alongside it to help cover costs.… This article has been indexed from The Register – Security Read…
PhD student guilty of 3D-printing ‘kamikaze’ drone for Islamic State terrorists
‘Research purposes’ excuse didn’t fly A PhD student has been found guilty of building a potentially deadly drone for Islamic State terrorists, in part using his home 3D printer.… This article has been indexed from The Register – Security Read…
Norway wants Facebook behavioral advertising banned across Europe
But Meta was just about to start asking people for their permission! Norway has told the European Data Protection Board (EDPB) it believes a countrywide ban on Meta harvesting user data to serve up advertising on Facebook and Instagram should…
Chinese snoops stole 60K State Department emails in that Microsoft email heist
No classified systems involved apparently, but internal diplomatic notes, travel details, staff SSNs, etc Chinese snoops stole about 60,000 State Department emails when they broke into Microsoft-hosted Outlook and Exchange Online accounts belonging to US government officials over the summer.……
Feds’ privacy panel backs renewing Feds’ S. 702 spying powers — but with limits
FBI agents ought to get spy court approval before reviewing US persons’ chats, board reckons A privacy panel within the US government today narrowly recommended that Congress reauthorize the Feds’ Section 702 spying powers — but with some stronger protections…
DARPA takes its long-duration Manta undersea drone for a test-dip
Autonomous sub should recharge and resupply in perfect stealth, hopefully DARPA’s extended-duration unmanned undersea vehicle (UUV) is having its first aquatic excursion to test if this naval drone has wings, er, fins.… This article has been indexed from The Register…
After failing at privacy, again, Google is working to keep Bard chats out of Search
The URLs needed to share chat histories have been indexed. Of course Google’s Bard chatbot is currently being re-educated to better understand privacy.… This article has been indexed from The Register – Security Read the original article: After failing at…
China’s national security minister rates fake news among most pressing cyber threats
He’s also worried about alliances that freeze out Chinese tech Chinese minister for national security Chen Yixin has penned an article rating the digital risks his country faces and rated network security incidents as the most realistic source of harm…
NYC rights groups say no to grocery store spycams and snooping landlords
Letter to City Council supports measures to ban biometric tech from public spaces “New Yorkers should not be forced to accept biometric surveillance as part of simple activities like buying groceries or taking their kids to a baseball game,” more…
ROBOT crypto attack on RSA is back as Marvin arrives
More precise timing tests find many implementations vulnerable An engineer has identified longstanding undetected flaws in a 25-year-old method for encrypting data using RSA public-key cryptography.… This article has been indexed from The Register – Security Read the original article:…
MOVEit breach delivers bundle of 3.4 million baby records
Progress Software vulnerability ID’d in enormous burglary at Ontario’s BORN Canada’s Better Outcomes Registry & Network (BORN) fears a MOVEit breach allowed cybercriminals to copy 3.4 million people’s childcare health records dating back more than a decade.… This article has…
Ukraine accuses Russian spies of hunting for war-crime info on its servers
Russian have shifted tactics in the first half of 2023, with mixed results The Ukrainian State Service of Special Communications and Information Protection (SSSCIP) has claimed that Russian cyberspies are targeting its servers looking for data about alleged Kremlin-backed war…
Mixin suspends deposits and withdrawals after $200m cryptocurrency heist
Cloud provider blamed for loss of 20% of exchange’s capital Mixin Network confirmd on Monday that it has “temporarily suspended” all deposit and withdrawal services after hackers broke into a database and stole about $200 million in funds from the…
T-Mobile US exposes some customer data – but don’t call it a breach
PLUS: Trojan hidden in PoC; cyber insurance surge; pig butchering’s new cuts; and the week’s critical vulns Infosec in brief T-Mobile US has had another bad week on the infosec front – this time stemming from a system glitch that…
T-mobile US exposes some customer data – but don’t call it a breach
PLUS: Trojan hidden in PoC; cyber insurance surge; pig butchering’s new cuts; and the week’s critical vulns Infosec in brief T-Mobile US has had another bad week on the infosec front – this time stemming from a system glitch that…
T-mobile exposes some customer data – but don’t call it a breach
PLUS: Trojan hidden in PoC; cyber insurance surge; pig butchering’s new cuts; and the week’s critical vulns Infosec in brief T-Mobile has had another bad week on the infosec front – this time stemming from a system glitch that exposed…
Apple squashes security bugs after iPhone flaws exploited by Predator spyware
Holes in iOS, macOS and more fixed up after tip off from Google, Citizen Lab Apple has emitted patches this week to close security holes that have been exploited in the wild by commercial spyware.… This article has been indexed…
ESA gets the job of building Europe’s secure satcomms network
IRIS2 oversight deal signed as constellation’s schedule slips, and Ariane 6 hits another snag The European Space Agency has signed up to build and launch the European Union’s Infrastructure for Resilience, Interconnectivity and Security by Satellite constellation.… This article has…
ESA gets the job of building Europe’s secure satcomms network
IRIS2 oversight deal signed as constellation’s schedule slips, and Ariane 6 hits another snag The European Space Agency has signed up to build and launch the European Union’s Infrastructure for Resilience, Interconnectivity and Security by Satellite constellation.… This article has…
US govt IT help desk techie ‘leaked top secrets’ to foreign nation
National defense files can earn you $55K … and espionage charges A US government worker has been arrested and charged with spying for Ethiopia, according to court documents unsealed Thursday.… This article has been indexed from The Register – Security…
TransUnion reckons big dump of stolen customer data came from someone else
Prolific info-thief strikes again Days after a miscreant boasted leaking a 3GB-plus database from TransUnion containing financial information on 58,505 people, the credit-checking agency has claimed the info was actually swiped from a third party.… This article has been indexed…
TransUnion reckons big dump of customer data came from someone else
Prolific info-thief strikes again Days after a miscreant boasted leaking a 3GB-plus database from TransUnion containing financial information on 58,505 people, the credit-checking agency has claimed the info was actually swiped from a third party.… This article has been indexed…
Cisco spends $28B on data cruncher Splunk in cybersecurity push
$157/share cash deal is the largest acquisition in networking titan’s history Cisco is making its most expensive acquisition ever – by far – with an announcement it’s buying data crunching software firm Splunk for $157 per share, or approximately $28…
Menacing marketeers fined by ICO for 1.9M cold calls
Five businesses facing half a million in collective penalties for illegally phoning folk registered with TPS The UK data watchdog has penalized five businesses it says collectively made 1.9 million cold calls to members of the public, illegally, as those…
India’s biggest tech centers named as cyber crime hotspots
Global tech companies’ Bharat offices attract the wrong sort of interest India is grappling with a three-and-a-half year surge in cyber crime, with analysis suggesting cities like Bengaluru and Gurgaon – centers of India’s tech development – are also hubs…
Data breach reveals distressing info: people who order pineapple on pizza
Pizza Hut Australia warns 190,000 customers’ data – including order history – has been accessed Pizza Hut’s Australian outpost has suffered a data breach.… This article has been indexed from The Register – Security Read the original article: Data breach…
Feds raise alarm over Snatch ransomware as extortion crew brags of Veterans Affairs hit
Invasion of the data snatchers The Snatch ransomware crew has listed on its dark-web site the Florida Department of Veterans’ Affairs as one of its latest victims – as the Feds warn organizations to be on the lookout for indicators…
Signal adopts new alphabet jumble to protect chats from quantum computers
X3DH readied for retirement as PQXDH is rolled out Signal has adopted a new key agreement protocol in an effort to keep encrypted Signal chat messages protected from any future quantum computers.… This article has been indexed from The Register…
International Criminal Court hacked amid Russia investigations
ICC admits breach in social media post, says response remains ongoing The International Criminal Court said criminals breached its IT systems last week but it isn’t over yet, with the ICC saying the “cybersecurity incident” is still ongoing.… This article…
Pot calls the kettle hack as China claims Uncle Sam did digital sneak peek first
Beijing accuses US of breaking into Huawei servers in 2009 The ongoing face-off between Washington and Beijing over technology and security issues has taken a new twist, with China accusing the US of hacking into the servers of Huawei in…
Robocall scammers sentenced in US after netting $1.2M via India-based call centers
Part of network of crims who used ‘trickery and threats’ to target elderly, says US Attorney Two Indian nationals each received 41-month prison sentences for their involvement in $1.2 million worth of robocall scams targeting the elderly, according to the…
Sysadmin and spouse admit to part in ‘massive’ pirated Avaya licenses scam
Will spend 20 years in prison after selling $88M in ADI software keys A sysadmin and his partner pleaded guilty this week to being part of a “massive” international ring that sold software licenses worth $88 million for “significantly below…
Broaden your cyber security knowhow at CyberThreat 2023
November’s two day conference sees experts from the cyber security community share their insight and knowledge Sponsored Post Cyber security remains a top three priority for most, if not all, organisations. The risks associated with failure to implement adequate defences…
Marvell disputes claim Cavium backdoored chips for Uncle Sam
Allegations date back a decade to leaked Snowden docs Cavium, a maker of semiconductors acquired in 2018 by Marvell, was allegedly identified in documents leaked in 2013 by Edward Snowden as a vendor of semiconductors backdoored for US intelligence. Marvell…