Category: The Register – Security

The rising risk of eavesdropping

How to deal with the evolving threat to our sensitive communications Webinar  There is a folk tale of a woman, who on being told a secret burned to tell someone what she had heard. Believing that it was safe to…

Suspected bank-infecting OPERA1ER crime boss cuffed

Cops reckon gang swiped as much as $30M from financial orgs International cops have arrested a suspected “key figure” of a cybercrime group dubbed OPERA1ER that has stolen as much as $30 million from more than 30 banks and financial…

Dublin Airport staff pay data ‘compromised’ by criminals

Attackers accessed it via third-party services provider, says management group It’s an awkward Monday for Dublin Airport after pay and benefits details for some 2,000 staff were apparently “compromised” following a recent attack on professional service provider Aon.… This article…

US authorities warn on China’s new counter-espionage law

Almost anything you download from China could be considered spying, but at least one analyst isn’t worried The United States’ National Counterintelligence and Security Center (NCSC) has warned that China’s updated Counter-Espionage law – which came into effect on July…

Japan rebukes Fujitsu for cloud security fails

PLUS: Philippines cyber-slave raid; South Korea’s crypto crackdown; AWS boosts Chinese exports; and more Asia In Brief  Japan’s government last Friday rebuked Fujitsu for shabby cloud security.… This article has been indexed from The Register – Security Read the original…

Life long cyber security learning

SANS training courses are scheduled for multiple locations across the EMEA region this Autumn Sponsored Post  Nobody here at is likely to argue with Albert Einstein’s idea that “intellectual growth should commence at birth and cease only at death”.… This…

Quirky QWERTY killed a password in Paris

Quelle tragédie – techie had to visit the city of lights twice to sort this one out On Call  Hard-coded into The Register‘s week is that each Friday morning you’ll find a new instalment of On Call, our reader contributed…

Tackling the cyber skills gap with AI

Why the future of cyber security could be fully autonomous where the AI works independently Sponsored Feature  The cybersecurity sector, it is now routinely attested, is in the midst of a long-term skills crisis.… This article has been indexed from…

Cloud security advice and expertise at your fingertips

Join AWS, Google Cloud, Microsoft Azure, and SANS Institute for the Cloud Security Exchange 2023 Sponsored Post  Imagine if you could get instant advice on how to protect your cloud infrastructure against cyber threats from some of the world’s best…

Ex-FBI employee jailed for taking classified material home

Also: a PII harvest at Dole’s server farm, military members mailed mystery smartwatches, and this week’s critical vulns Infosec in brief  In a case startlingly similar to charges recently unsealed against one-term US president Donald Trump, a former FBI analyst…

The unlimited value of a strong defence

How protective AI is a powerful weapon in the fight against cyber attackers using AI for malicious acts. Webinar  In the new age of generative AI, it would be foolhardy to imagine that bad actors won’t already be exploiting every…

Keep it schtum!

Ensuring communications stay secure Webinar  The explosion in remote working since the pandemic means the number of people doing their job from home has more than doubled in the UK.… This article has been indexed from The Register – Security…

A clash of titans

Shielding with protective AI from bad actors using AI for cyberattacks Webinar  The one thing a cyber security team can rarely afford to do is relax its vigilance. But count the collective manhours spent on the frontline and the figure…

Apple squashes kernel bug used by TriangleDB spyware

Snoops may be targeting macOS devices in addition to iPhones, Kaspersky says Whoever is infecting people’s iPhones with the TriangleDB spyware may be targeting macOS computers with similar malware, according to Kaspersky researchers.… This article has been indexed from The…

Training in Spanish for cyber security pros

Sponsored Post  Cybercrime is a global phenomenon, but the effectiveness of measures put in place to fight it varies considerably from one region to another.… This article has been indexed from The Register – Security Read the original article: Training…

Oreo cookie maker says crooks gobbled up staff info

50K-plus employees’ personal info swiped after law firm rolled Mondelez International has warned 51,000 of its past and present employees that their personal information has been stolen from a law firm hired by the Oreo and Ritz cracker giant.… This…

Reddit confirms BlackCat gang pinched some data

Crooks demand $4.5m to keep ’80GB’ of corp info private – and no API price hikes Reddit this week confirmed ransomware gang BlackCat, aka AlphaV, broke into its corporate systems in February.… This article has been indexed from The Register…

Outsource to infill on cyber security

Automating, simplifying, and calling in external help can increase the chances of blocking and mitigating attacks Sponsored Feature  Life is tougher than ever for security pros facing a rising tide of cyberattacks. And adversaries are becoming more adept than ever…

US government hit by Russia’s Clop in MOVEit mass attack

CISA chief tells us exploitation ‘largely opportunistic’, not on same level of SolarWinds The US Department of Energy and other federal bodies are among a growing list of organizations hit by Russians exploiting the MOVEit file-transfer vulnerability.… This article has…

Lethal weather

Forecasting the flux and flow of threats to the cloud Webinar  The cloud is floating around everywhere and with the rapid expansion of IT always comes new complexities that alter the threat landscape.… This article has been indexed from The…

Bringing security to account: why identity must be unified

As identity management becomes the new security perimeter, cyber risk underwriters want to see resilient IAM control ID sprawl Sponsored Feature  Many organizations are suffering from an identity crisis. Not in the psychological sense, nor in respect to their branding…

The commonality of criminal intrusion

Rubrik Zero Lab’s ‘The Hard Truths’ annual report into the state of data security Webinar  It seems no longer possible to imagine whether it’s just a case of if a security breach will occur within your organization, or if malicious…

Russia-Ukraine war sending shockwaves into cyber-ecosystem

Conflict could be first shooting war to deploy armies of ‘citizen hackers’ that cause at-risk organisations to rethink their defensive strategies Sponsored Feature  When military historians come to chronicle the first 15 months of the Russian invasion of Ukraine, they…

China’s cyber now aimed at infrastructure, warns CISA boss

Resilience against threats needs a boost China’s cyber-ops against the US have shifted from espionage activities to targeting infrastructure and societal disruption, the director of the Cybersecurity and Infrastructure Security Agency (CISA) Jen Easterly told an Aspen Institute event on…

India probes medical info ‘leak’ to Telegram

PLUS: Vietnam’s free domain names for youngsters; China’s Cuba spy base; Hyundai and Samsung team for car chips; and more Asia In Brief  India’s government has denied its Co-WIN COVID-19 vaccination management platform has leaked data, but ordered an investigation…

Fortinet squashes hijack-my-VPN bug in FortiOS gear

And it’s already being exploited in the wild, probably Fortinet has patched a critical bug in its FortiOS and FortiProxy SSL-VPN that can be exploited to hijack the equipment.… This article has been indexed from The Register – Security Read…

Ransomware scum hit Japanese pharma giant Eisai Group

Some servers encrypted in weekend attack, but product supply not affected Japanese pharma giant Eisai today confirmed to The Register that “there is no imminent risk of stock shortage” after it was hit by ransomware at the weekend.… This article…

North Korea’s Lazarus Group linked to Atomic Wallet heist

Users’ cryptocurrency wallets look unlikely to be refilled The North Korean criminal gang Lazarus Group has been blamed for last weekend’s attack on Atomic Wallet that drained at least $35 million in cryptocurrency from private accounts.… This article has been…

On the frontline of cyber threats

Watch it here: the unvarnished truth about the state of data security Webinar  Rubrik Zero Lab’s annual report on the state of data security is not a comfortable read. And as if to prepare you for what lies inside, the…