Category: The Register – Security

Russian allegedly smuggled US weapons electronics to Moscow

Feds claim sniper scope displays sold in sanctions-busting move A Russian national helped smuggle, via shell companies in Hong Kong, more than $1.6 million in microelectronics to Moscow potentially to support its war against Ukraine, it is claimed.… This article…

Former CIO accuses Penn State of faking cybersecurity compliance

Now-NASA boffin not impressed Last October, Pennsylvania State University (Penn State) was sued by a former chief information officer for allegedly falsifying government security compliance reports.… This article has been indexed from The Register – Security Read the original article:…

Ransomware attack hits Sri Lanka government, causing data loss

Running unsupported and unpatched versions of Exchange Server will do that to a country Sri Lanka’s Computer Emergency Readiness Team (CERT) is currently investigating a ransomware attack on the government’s cloud infrastructure that affected around 5,000 email accounts, it revealed…

Huge DDoS attack against US financial institution thwarted

Akamai reckons traffic flood peaked at 55.1 million packets per second Akamai says it thwarted a major distributed denial-of-service (DDoS) attack aimed at a US bank that peaked at 55.1 million packets per second earlier this month.… This article has been indexed…

Malice in the mail

Defence against the dark arts of phishing Webinar  Almost half of all losses to cybercrime come from Business Email Compromise (BEC), according to the FBI. It appears that even the most astute among us can fall foul of a cunningly…

Safe delivery

How to protect organizations from Business Email Compromise Webinar  It is a stratospheric number of emails pinging around the globe and the sheer volume offers a seductively lucrative phishing opportunity to the legion of bad actors out there.… This article…

Apple races to patch the latest zero-day iPhone exploit

No user interaction needed for this one as Pegasus turns up via iMessage Apple devices are again under attack, with a zero-click, zero-day vulnerability used to deliver Pegasus spyware to iPhones discovered in the wild.… This article has been indexed…

US, UK sanction more Russians linked to Trickbot

Top admin, HR managers, devs go on transatlantic deny-list The US and UK governments named and sanctioned 11 Russians said to be connected to the notorious Trickbot cybercrime crew this week.… This article has been indexed from The Register –…

China reportedly bans iPhones from more government offices

So what? Smartphones are routinely restricted in, or excluded from, sensitive locations Analysis  Chinese authorities have reportedly banned Apple’s iPhones from some government offices.… This article has been indexed from The Register – Security Read the original article: China reportedly…

Meatbag mishaps more menacing than malware? CISOs think so

Company boards, on the other hand, aren’t letting cybersecurity disturb their sleep as much Chief information security officers (or CISOs) see human error as the most significant risk to data protection compared to other UK board directors.… This article has…

Freecycle gives users the gift of a data breach notice

Change your passwords. And maybe give the recycling a miss this time Freecycle, the charity aimed at recycling detritus that would otherwise be headed for landfill, has become the latest organization to suffer at the hands of cyber attackers and…

Tsunami watch

Mitigating the threat of bot-driven DDoS attacks Webinar  It’s sometimes easy to be lulled into a sense of false security and imagine that your organization or business will not become a target of highly professional cybercriminals, hacktivists and even nation-state…

Apple opens annual applications for free hackable iPhones

ALSO: Brazilian stalkerware database ripped by the short hairs, a fast fashion breach, and this week’s critical vulns Infosec in brief  The latest round of Apple’s Security Research Device (SRD) program is open, giving security researchers a chance to get…

More Okta customers trapped in Scattered Spider’s web

Oktapus phishing campaign criminals are back in action Customers of cloudy identification vendor Okta are reporting social engineering attacks targeting their IT service desks in attempts to compromise user accounts with administrator permissions.… This article has been indexed from The…

Massive attack

Defeating a DDoS swarm Webinar  Any organization can lose service, revenue, and reputation as a result. If you are particularly unlucky, a DDoS attack can defenestrate your network defences. You may find yourself facing an cyber criminal who wants to…

Microsoft angry over Russian-led UN cybercrime treaty

It could be used to put ethical hackers, and citizens, behind bars A controversial United Nations proposal has a new foe, Microsoft, which has joined the growing number of organizations warning delegates that the draft version of the UN cybercrime…

FBI-led Operation Duck Hunt shoots down Qakbot

Totally plucked: Agents remotely roasted Windows botnet malware on victims’ machines Uncle Sam today said an international law enforcement effort dismantled Qakbot, aka QBot, a notorious botnet and malware loader responsible for losses totaling hundreds of millions of dollars worldwide,…

More UK cops’ names and photos exposed in supplier breach

All 47,000 Met Police officers and staff reportedly accessed in break-in London’s Metropolitan Police has said a third-party data breach exposed staff and officers’ names, ranks, photos, vetting levels, and salary information.… This article has been indexed from The Register…

Whiffy malware stinks after tracking location via Wi-FI

ALSO: Euro chip maker breached, crims plan to undermine cyber insurance, and this week’s critical vulnerabilities Infosec in Brief  No one likes malware, but malicious code that tracks your location is particularly unlovable.… This article has been indexed from The…

Pulling the strings

The critical rise of generative AI use in ransomware attacks on applications Webinar  It’s a fact of life that ransomware is a constant threat, like a dark cloud on every horizon. Recent research suggests that the volume of attacks has…

The devil in the detail

How AI is powering ransomware attacks on applications Webinar  You could be forgiven for wondering if anything can ever again be completely straightforward or demonstrably authentic in a world where generative AI can masquerade convincingly as your mother, or express…

Ivanti Sentry exploited in the wild, patches emitted

Good thing you’re not exposing admin port 8443 to the world, right? Uh, right? A critical authentication bypass bug in MobileIron Sentry has been exploited in the wild, its maker Ivanti said in an advisory on Monday.… This article has…