Proofpoint spots efforts to spy on US economic policy nerds Chinese state-aligned online attackers are back at it, targeting US trade policy wonks as Washington and Beijing spar over economic ties.… This article has been indexed from The Register –…
Category: The Register – Security
Russian fake-news network, led by an ex-Florida sheriff’s deputy, storms back into action with 200+ new sites
As the Trump administration guts efforts to counter election disinfo The Russian troll farm that in the lead-up to the 2024 US presidential election posted a bizarro video claiming Democratic candidate Kamala Harris was a rhino poacher, is back with…
Scattered Spider gang feigns retirement, breaks into bank instead
You didn’t really trust the crims to keep their word, did you? Spiders don’t change their stripes. Despite gang members’ recent retirement claims, Scattered Spider hasn’t exited the cybercrime business and instead has shifted focus to the financial sector, with…
Axiom Space aims for orbit with its Orbital Data Center Node
But will the International Space Station still be there to host its node? Axiom Space and Spacebilt have announced plans to add optically interconnected Orbital Data Center (ODC) infrastructure to the International Space Station (ISS).… This article has been indexed…
Axiom Space aims for the International Space Station with its Orbital Data Center Node
But will the ISS still be there to host it? Axiom Space and Spacebilt have announced plans to add optically interconnected Orbital Data Center (ODC) infrastructure to the International Space Station (ISS).… This article has been indexed from The Register…
UK telco Colt’s recovery from August cyberattack pushes into November
Pentesters confirm key system is safe but core products remain unavailable Brit telco Colt Technology Services says its recovery from an August cyberattack might not be completed until late November.… This article has been indexed from The Register – Security…
BreachForums kingpin goes from walk-free deal to 3-year stretch
Prosecutors say Conor Fitzpatrick’s crimes caused ‘incalculable’ damage The founder of the popular cybercrime website BreachForums will spend three years in prison after previously being let off with a slap on the wrist.… This article has been indexed from The…
UEFI Secure Boot for Linux Arm64 – where do we stand?
Still exotic for now, but moves are afoot Arm devices are everywhere today and many of them run Linux. The operating system also powers cloud computing and IT environments all over the world. However, x86 is still the dominant architecture…
Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack
Google and ETH Zurich found problems with AMD/SK Hynix combo, will probe other hardware Researchers from Google and Swiss university ETH Zurich have found a new class of Rowhammer vulnerability that could allow attackers to access info stored in DDR5…
Australia to let Big Tech choose its own adventure to enact kids social media ban
Suggests using multiple overlapping approaches and being kind to kids who get kicked off Australia’s eSafety commissioner has told social media operators it expects them to employ multiple age assurance techniques and technologies to keep children under sixteen off social…
Microsoft blocks bait for ‘fastest-growing’ 365 phish kit, seizes 338 domains
Redmond names alleged ringleader, claims 5K+ creds stolen and $100k pocketed Microsoft has seized 338 websites associated with RaccoonO365 and identified the leader of the phishing service – Joshua Ogundipe – as part of a larger effort to disrupt what…
Criminals broke into the system Google uses to share info with cops
Talk about an inside job Google confirmed that miscreants created a fraudulent account in its Law Enforcement Request System (LERS) portal, which police and other government agencies use to ask for data about Google users.… This article has been indexed…
Apple 0-day likely used in spy attacks affected devices as old as iPhone 8
May have been used in ‘extremely sophisticated’ attacks against ‘specific targeted individuals’ Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in what…
Self-propagating worm fuels latest npm supply chain compromise
Intrusions bear the same hallmarks as recent Nx mess The npm platform is the target of another supply chain attack, with crims already compromising 187 packages and counting.… This article has been indexed from The Register – Security Read the…
‘FileFix’ attacks use fake Facebook security alerts to trick victims into running infostealers
Tech evolved from PoC to global campaign in under two months An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC infostealer and malware downloader.… This article has been indexed from The…
JLR stuck in neutral as losses skyrocket amid cyberattack cleanup
Latest extension to factory closures takes incident response into fourth week Jaguar Land Rover (JLR) has announced a further extension to its multi-site global shutdown, bringing its cyber-related downtime to nearly four weeks.… This article has been indexed from The…
China slaps 1-hour deadline on reporting serious cyber incidents
Cyberspace watchdog tightens reporting regime, leaving little time to hide incidents Beijing will soon expect Chinese network operators to ‘fess up to serious cyber incidents within an hour of spotting them – or risk penalties for dragging their feet.… This…
Careless engineer stored recovery codes in plaintext, got whole org pwned
Cautionary tale from the recent SonicWall attacks Failing to encrypt sensitive data leaves you wide open to attack. During the recent SonicWall attack spree, intruders bypassed multi-factor authentication (MFA) in at least one case, because a user’s recovery codes were…
Security begins with visibility: How IGA brings hidden access risks to light
Who has access to what? Without centralized governance, orgs struggle to answer this simple question. Partner Content From the moment users log onto their machines, access rights shape their experience. Access rights determine which apps they can run, which directories…
Former FinWise employee may have accessed nearly 700K customer records
Bank says incident went undetected for over a year before discovery in June A US fintech biz is writing to nearly 700,000 customers because a former employee may have accessed or acquired their data after leaving the company.… This article…