Infosec employers demanding too much from early-career recruits, says ISC2 Cybersecurity hiring managers need a reality check when it comes to hiring junior staff, with job adverts littered with unfair expectations that are hampering recruitment efforts, says industry training and…
Category: The Register – Security
Slapped wrists for Financial Conduct Authority staff who emailed work data home
It was one of the offenders’ final warning Four staffers at the UK’s Financial Conduct Authority (FCA) were let off with warnings over separate cases involving the transmission of regulator data to their personal email accounts.… This article has been…
Ransomware scum disrupted utility services with SimpleHelp attacks
Good news: The vendor patched the flaw in January. Bad news: Not everyone got the memo Ransomware criminals infected a utility billing software providers’ customers, and in some cases disrupted services, after exploiting unpatched versions of SimpleHelp’s remote monitoring and…
‘Major compromise’ at NHS temping arm exposed gaping security holes
Incident responders suggested sweeping improvements following Active Directory database heist Exclusive Cybercriminals broke into systems belonging to the UK’s NHS Professionals body in May 2024, stealing its Active Directory database, but the healthcare organization never publicly disclosed it, The Register…
DeepSeek installer or just malware in disguise? Click around and find out
‘BrowserVenom’ is pure poison Suspected cybercriminals have created a fake installer for Chinese AI model DeepSeek-R1 and loaded it with previously unknown malware called “BrowserVenom”.… This article has been indexed from The Register – Security Read the original article: DeepSeek…
Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks
The 16 other flagged issues are on customers, says CRM giant Salesforce has assigned five CVE identifiers following a security report that uncovered more than 20 configuration weaknesses, some of which exposed customers to unauthorized access and session hijacking.… This…
Hire me! To drop malware on your computer
FIN6 moves from point-of-sale compromise to phishing recruiters In a scam that flips the script on fake IT worker schemes, cybercriminals posing as job seekers on LinkedIn and Indeed are targeting recruiters – a group hated only slightly less than…
Asia dismantles 20,000 malicious domains in infostealer crackdown
Interpol coordinates operation, nabs 32 across Vietnam, Sri Lanka, and Nauru Thirty-two people across Asia have been arrested over their suspected involvement with infostealer malware in the latest international collaboration against global cybercrime.… This article has been indexed from The…
Analysis to action: Operationalizing your threat intelligence
Timing is everything in the war against ransomware thieves, says Prelude Security Partner content When a new security advisory drops or an alarming new ransomware campaign makes the news, the question from leadership inevitably follows: “Are we covered?”… This article…
Microsoft slows Windows 11 24H2 Patch Tuesday due to a ‘compatibility issue’
On your marks, get set… bork! Microsoft has set a new record with June’s security update for the time between release and an admission of borkage.… This article has been indexed from The Register – Security Read the original article:…
CISO who helped unmask Badbox warns: Version 3 is coming
The botnet’s still alive and evolving Badbox 2.0, the botnet that infected millions of smart TV boxes and connected devices before private security researchers and law enforcement partially disrupted its infrastructure, is readying for a third round of fraud and…
Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack
Stealthy Falcon swoops on WebDAV and Redmond’s even patching IE! Patch Tuesday It’s Patch Tuesday time again, and Microsoft is warning that there are a bunch of critical fixes to sort out – and two actively exploited bugs.… This article…
Texas warns 300,000 crash reports siphoned via compromised user account
Lone Star State drivers with accident records need to be careful about fraud The Texas Department of Transportation says a compromised user account was used to improperly download nearly 300,000 crash reports, exposing personal data that could be exploited for…
Critical Wazuh bug exploited in growing Mirai botnet infection
The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code execution bug was disclosed.……
Winning the war on ransomware with AI: Four real-world use cases
AI is your secret weapon against ransomware crooks. Here’s how to use it Partner Content Cybercriminals are evolving, and so are the tools to stop them. As AI becomes more accessible, attackers are sharpening their tactics. But here’s the good…
Trump guts digital ID rules, claims they help ‘illegal aliens’ commit fraud
Also axes secure software mandates – optional is the new secure, apparently President Donald Trump late Friday signed a cybersecurity-focused executive order that, in the White House’s words, “amends problematic elements of Obama and Biden-era Executive Orders.”… This article has…
Cloud brute-force attack cracks Google users’ phone numbers in minutes
Chocolate Factory fixes issue, pays only $5K A researcher has exposed a flaw in Google’s authentication systems, opening it to a brute-force attack that left users’ mobile numbers up for grabs.… This article has been indexed from The Register –…
M&S online ordering system operational 46 days after cyber shutdown
A milestone in cyberattack recovery – but deliveries will take a while and normal service not yet back UK retailer Marks & Spencer has reinstated online orders for some customers, marking a major milestone in its recovery from a cyberattack…
Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser
Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what’s possible.… This article…
Apple tries to contain itself with lightweight Linux VMs for macOS
Swift-based containerization framework aims to improve performance and security Apple on Monday unveiled an open source containerization framework for creating and running Linux container images on the Mac.… This article has been indexed from The Register – Security Read the…