PLUS: Judge spanks NSO; Mozilla requires data use disclosures; TARmageddon meets Rust; And more! Infosec In Brief Former basketball star Shaquille O’Neal is 7’1″ (215 cm), and therefore uses car customization companies to modify vehicles to fit his frame. But…
Category: The Register – Security
MPs urge government to stop Britain’s phone theft wave through tech
Committee says Apple, Google, and Samsung could render stolen handsets worthless if compelled to act The UK’s Home Secretary should use her powers to push the tech industry to deploy stronger technical measures against the surge in phone thefts, according…
Sneaky Mermaid attack in Microsoft 365 Copilot steals data
Redmond says it’s fixed this particular indirect prompt injection vuln Microsoft fixed a security hole in Microsoft 365 Copilot that allowed attackers to trick the AI assistant into stealing sensitive tenant data – like emails – via indirect prompt injection…
Microsoft drops surprise Windows Server patch before weekend downtime
You didn’t have plans, did you? Microsoft has released an out-of-band update to patch a critical vulnerability in Windows Server Update Services (WSUS).… This article has been indexed from The Register – Security Read the original article: Microsoft drops surprise…
Digital ID is now less about illegal working, more about rummaging through drawers
Starmer rebrands unpopular scheme as convenience tool after backlash UK Prime Minister Keir Starmer has relaunched his digital ID scheme as something that will make people’s lives easier, less than four weeks after announcing it as a measure to tackle…
Shield AI shows off not-at-all-terrifying autonomous VTOL combat drone
Runways? Where we’re going, we don’t need runways US defense technology biz Shield AI claims it can build a jet-powered vertical take-off and landing (VTOL) autonomous fighter drone that doesn’t need a runway to operate.… This article has been indexed…
Iran’s MuddyWater wades into 100+ government networks in latest spying spree
Group-IB says Tehran-linked crew used hijacked mailbox and VPN to sling phishing emails across Middle East Iran’s favorite muddy-footed cyberespionage crew is at it again, this time breaching more than 100 government entities across the Middle East and North Africa,…
Cyber exec with lavish lifestyle charged with selling secrets to Russia
The 0-days have left the building Federal prosecutors have charged a former general manager of US government defense contractor L3Harris’s cyber arm Trenchant with selling secrets to an unidentified Russian buyer for $1.3 million.… This article has been indexed from…
Playtime’s over: Crooks swipe Toys R Us Canada customer data and dump it online
What?! No complimentary credit monitoring? The Canadian outpost of retailer Toys R Us on Thursday notified customers that attackers accessed a database, stole some of their personal information, then posted the data online.… This article has been indexed from The…
Trump’s workforce cuts blamed as America’s cyber edge dulls
The Cyberspace Solarium Commission says years of progress are being undone amid current administration’s cuts America’s once-ambitious cyber defences are starting to rust, according to the latest annual report from the US Cyberspace Solarium Commission (CSC), which warns that policy…
Google nukes 3,000 YouTube videos that sowed malware disguised as cracked software
Check Point helps exorcise vast ‘Ghost Network’ that used fake tutorials to push infostealers Google has taken down thousands of YouTube videos that were quietly spreading password-stealing malware disguised as cracked software and game cheats.… This article has been indexed…
SpaceX pulls plug on 2,500 Starlink terminals tied to Myanmar fraud farms
Criminal outfits had been using Musk’s broadband beacons to run cyber-slavery scams across Southeast Asia SpaceX says it has shut down thousands of Starlink terminals that were powering Myanmar’s notorious scam compounds after its satellite network was found to be…
This free IGA tool boosts your identity security
Here are five ways tenfold’s free IGA solution helps you streamline identity governance and access control. Partner Content In a world where one wrong click can set off a catastrophic breach, organizations must control what their users have access to…
Forking confusing: Vulnerable Rust crate exposes uv Python packager
Forks of forks of forks, but which ones are patched? A vulnerability in the popular Rust crate async-tar has affected the fast uv Python package manager, which uses a forked version that’s now patched – but the most widely downloaded…
Jaguar Land Rover cyber-meltdown tipped to cost the UK almost £2B
That’s a lot of extended warranties The Jaguar Land Rover (JLR) cyberattack could end up being the costliest such incident in UK history, billed at an estimated £1.9 billion and affecting over 5,000 organizations.… This article has been indexed from…
UK data regulator defends decision not to investigate MoD Afghan data breach
ICO says probe unnecessary after reviewing ministry’s handling of leak The UK’s data protection regulator declined to launch an investigation into a leak at the Ministry of Defence that risked the lives of thousands of Afghans connected with the British…
Restructuring risk operations: building a business-aligned cyber strategy
Why organizations need a new strategy to break down silos and usher in a new era of risk intelligence Partner Content As cyber risk continues to escalate, many organizations face a disconnect between cybersecurity investments and actual risk reduction. Despite…
Muji’s minimalist calm shattered as ransomware takes down logistics partner
Japanese retailer halts online orders after attack cripples third-party vendor Japanese retailer Muji is suspending online orders after logistics partner Askul was knocked offline by a ransomware attack.… This article has been indexed from The Register – Security Read the…
Feds flag active exploitation of patched Windows SMB vuln
CISA adds high-severity flaw to KEV list, urges swift updating Uncle Sam’s cyber wardens have warned that a high-severity flaw in Microsoft’s Windows SMB client is now being actively exploited – months after it was patched.… This article has been…
A shot in the dark: Can malware vaccines stop ransomware’s rampage?
Security pros explore whether infection-spoofing code can immunize Windows systems against attack Feature What’s better, prevention or cure? For a long time the global cybersecurity industry has operated by reacting to attacks and computer viruses. But given that ransomware has…