Category: The Register – Security

Capita looking at a bill of £20M over breach clean-up costs

Analyst says expense ‘no small drop in ocean’ but reputational damage could be ‘far greater’ Britain’s leaky outsourcing behemoth Capita is warning investors that the clean-up bill for its recent digital break-in will cost up to £20 million ($25.24 million).……

FYI: Intel BootGuard OEM private keys leak from MSI cyber heist

Plus: Court-ordered domain seizures of DDoS-for-hire sites Intel is investigating reports that BootGuard private keys, used to protect PCs from hidden malware, were leaked when data belonging to Micro-Star International (MSI) was stolen and dumped online. … This article has been…

FYI: Intel BootGuard OEM private keys leak from MSI cyber-heist

Plus: Court-ordered domain seizures of DDoS-for-hire sites Intel is investigating reports that BootGuard private keys, used to protect PCs from hidden malware, were leaked when data belonging to Micro-Star International (MSI) was stolen and dumped online. … This article has been…

T-Mobile suffers second data theft in less than six months

Also, Capita’s buckets are leaking, ransomware attackers deliver demands via emergency alert, and this week’s critical vulns in brief  We’d say you’ll never guess which telco admitted to a security breakdown last week, but you totally will: T-Mobile US, and…

Chrome’s HTTPS padlock heads to Google Graveyard

As blue check marks start showing up in Gmail Logowatch  Google plans to retire the padlock icon that appears in the Chrome status bar during a secure HTTPS web browsing session because the interface graphic has outlived its usefulness.… This…

The importance of being certified

New GIAC Security Professional and revamped GIAC Security Expert qualifications offer increased choice and flexibility for cybersecurity pros Sponsored Post  The importance of certifications such as the GIAC (Global Information Assurance Certification) has never been greater for infosec professionals. Because…

288 arrested in multinational Monopoly Market takedown

US tells criminals it ‘will find you’ and has a particular set of skills In an international operation 288 people have been arrested across the US, Europe and South America after allegedly selling opioids on the now-shuttered Monopoly Market dark…

In the face of data disaster

How to recover from cyber attacks on Microsoft 365 Webinar  Every organization needs a full set of data recovery tools. The sort that will get you back up and running quickly after a ransomware attack, outage, or accidental data deletion.…

Centralized secrets management picks up pace

How cloud migration and machine identities are fueling enterprise demand for secrets management systems Sponsored Feature  There’s no question that fast-feedback software delivery offers multiple advantages by streamlining processes for developers. But in software development, as in life, there is…

Google adds account sync for Authenticator, without E2EE

Also: Your Salesforce Community site might be leaking; a new CPU side-channel; and this week’s critical vunls in brief  You may have heard news this week that Google is finally updating its authenticator app to add Google account synchronization. Before…

The good, the bad and the generative AI

ChatGPT is just the beginning: CISOs need to prepare for the next wave of AI-powered attacks Sponsored Feature  Change in the tech industry is usually evolutionary, but perhaps more interesting are the exceptions to this rule – the microprocessor in…

Microsoft pushes for more women in cybersecurity

Redmond tops industry average, still got a way to go Microsoft has partnered with organizations around the globe to bring more women into infosec roles, though the devil is in the details.… This article has been indexed from The Register…

Healthcare organisations urged to improve system security

Patient data covering sensitive areas has long been a high-value target for cybercriminals Sponsored Post  Digital patient medical records now cover a whole gamut of sensitive details such as clinical diagnoses/treatments, prescriptions, personal finances and insurance policies. Which makes keeping…

AI defenders ready to foil AI-armed attackers

Operational AI cybersecurity systems have been gaining valuable experience that will enable them to defend against AI-armed opponents. Sponsored Feature  For some time now, alerts concerning the utilisation of AI by cybercriminals have been sounded in specialist and mainstream media…

Protect the Industrial Control Systems (ICS)

ICS security is fast becoming a frontline defense against hackers intent on causing mayhem Sponsored Post  Some of the most famous cyber attacks in history have been directed against Industrial Control Systems (ICS).… This article has been indexed from The…

GitHub debuts pedigree check for npm packages via Actions

Publishing provenance possibly prevents problems Developers who use GitHub Actions to build software packages for the npm registry can now add a command flag that will publish details about the code’s origin.… This article has been indexed from The Register…

Prioritize what matters most

How to manage your cloud and container vulnerabilities at scale Webinar  There’s nothing complicated about the statistics released in Sysdig’s latest report. They’re alarming and should keep many an IT team up at night.… This article has been indexed from…

LockBit crew cooks up half-baked Mac ransomware

Please, no need to fix these bugs LockBit has developed ransomware that can encrypt files on Arm-powered Macs, said to be a first for the prolific cybercrime crew. … This article has been indexed from The Register – Security Read the…

Compatibility mess breaks not one but two Windows password tools

Windows LAPS and legacy LAPS don’t play nicely under certain conditions, Microsoft says Integrating the Local Administrator Password Solution (LAPS) into Windows and Windows Server that came with updates earlier this week is causing interoperability problems with what’s called legacy…