Lone Star State drivers with accident records need to be careful about fraud The Texas Department of Transportation says a compromised user account was used to improperly download nearly 300,000 crash reports, exposing personal data that could be exploited for…
Category: The Register – Security
Critical Wazuh bug exploited in growing Mirai botnet infection
The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code execution bug was disclosed.……
Winning the war on ransomware with AI: Four real-world use cases
AI is your secret weapon against ransomware crooks. Here’s how to use it Partner Content Cybercriminals are evolving, and so are the tools to stop them. As AI becomes more accessible, attackers are sharpening their tactics. But here’s the good…
Trump guts digital ID rules, claims they help ‘illegal aliens’ commit fraud
Also axes secure software mandates – optional is the new secure, apparently President Donald Trump late Friday signed a cybersecurity-focused executive order that, in the White House’s words, “amends problematic elements of Obama and Biden-era Executive Orders.”… This article has…
Cloud brute-force attack cracks Google users’ phone numbers in minutes
Chocolate Factory fixes issue, pays only $5K A researcher has exposed a flaw in Google’s authentication systems, opening it to a brute-force attack that left users’ mobile numbers up for grabs.… This article has been indexed from The Register –…
M&S online ordering system operational 46 days after cyber shutdown
A milestone in cyberattack recovery – but deliveries will take a while and normal service not yet back UK retailer Marks & Spencer has reinstated online orders for some customers, marking a major milestone in its recovery from a cyberattack…
Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser
Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what’s possible.… This article…
Apple tries to contain itself with lightweight Linux VMs for macOS
Swift-based containerization framework aims to improve performance and security Apple on Monday unveiled an open source containerization framework for creating and running Linux container images on the Mac.… This article has been indexed from The Register – Security Read the…
Let them eat junk food: Major organic supplier to Whole Foods, Walmart, hit by cyberattack
United Natural Foods shut down some of its systems on June 5 after spotting network intruders North American grocery wholesaler United Natural Foods told regulators that a cyber incident temporarily disrupted operations, including its ability to fulfill customer orders.… This…
Blocking stolen phones from the cloud can be done, should be done, won’t be done
Big tech can’t be bothered to fight crime. It can barely be bothered even to say so Opinion A lot of our tech world is nightmarish, but sometimes this is literally true.… This article has been indexed from The Register…
Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs
SentinelOne discovered the campaign when they tried to hit the security vendor’s own servers An IT services company, a European media group, and a South Asian government entity are among the more than 75 companies where China-linked groups have planted…
Are technologists a threat to doing business securely?
Why an obsession with technology prevents us from reducing human-initiated cybersecurity breaches Partner content Cybersecurity leaders are fighting an invisible war, not just with threat actors but within their own organizations. It’s a conflict I’ve spent a lot of time…
China’s asteroid-and-comet hunter probe unfurls a ‘solar wing’
PLUS: Hitachi turns greybeards into AI agents; Tiananmen anniversary censorship; AWS in Taiwan; and more! China’s space agency has revealed its Tianwen 2 probe has unfurled a ‘solar wing’.… This article has been indexed from The Register – Security Read…
US infrastructure could crumble under cyberattack, ex-NSA advisor warns
PLUS: Doxxers jailed; Botnets bounce back; CISA questioned over app-vetting program closure; And more Infosec in Brief If a cyberattack hit critical infrastructure in the US, it would likely crumble, former deputy national security adviser and NSA cybersecurity director Anne…
Enterprises are getting stuck in AI pilot hell, say Chatterbox Labs execs
Security, not model performance, is what’s stalling adoption Interview Before AI becomes commonplace in enterprises, corporate leaders have to commit to an ongoing security testing regime tuned to the nuances of AI models.… This article has been indexed from The…
ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist
OpenAI boots accounts linked to 10 malicious campaigns Fake IT workers possibly linked to North Korea, Beijing-backed cyber operatives, and Russian malware slingers are among the baddies using ChatGPT for evil, according to OpenAI’s latest threat report.… This article has…
Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure
Destructive malware has been a hallmark of Putin’s multi-modal war A new strain of wiper malware targeting Ukrainian infrastructure is being linked to pro-Russian hackers, in the latest sign of Moscow’s evolving cyber tactics.… This article has been indexed from…
Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring
The cash has been frozen for more than two years The US is looking to finally capture the $7.74 million it froze over two years ago after indicting alleged money launderers it claims are behind North Korean IT worker schemes.……
Your ransomware nightmare just came true – now what?
Don’t negotiate unless you must, and if so, drag it out as long as you can Feature So, the worst has happened. Computer screens all over your org are flashing up a warning that you’ve been infected by ransomware, or…
Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies
Any info on Maxim Rudometov and his associates? There’s $$$ in it for you The US government is offering up to $10 million for information on foreign government-backed threat actors linked to the RedLine malware, including its suspected developer, Maxim…