Category: The Register – Security

Securing open source software: Whose job is it, anyway?

CISA announces more help, and calls on app makers to step up The US government and some of the largest open source foundations and package repositories have announced a series of initiatives intended to improve software supply-chain security, while also…

Possible China link to Change Healthcare ransomware attack

Alleged crim bought SmartScreen Killer, Cobalt Strike on dark-web markets A criminal claiming to be an ALPHV/BlackCat affiliate — the gang responsible for the widely disruptive Change Healthcare ransomware infection last month —  may have ties to Chinese government-backed cybercrime…

VMware urges emergency action to blunt hypervisor flaws

Critical vulns in USB under ESXi and desktop hypervisors found by Chinese researchers at cracking contest Hypervisors are supposed to provide an inviolable isolation layer between virtual machines and hardware. But hypervisor heavyweight VMware by Broadcom yesterday revealed its hypervisors…

FBI: Critical infrastructure suffers spike in ransomware attacks

Jump in overall cybercrime reports, $60M-plus reportedly lost to extortionists alone, Feds reckon Digital crimes potentially cost victims more than $12.5 billion last year, according to the FBI’s latest Internet Crime Complaint Center (IC3) annual report. … This article has been…

Spam crusade lands charity in hot water with data watchdog

Penny Appeal sent more than 460,000 texts asking for money to help war-torn countries, no opt out Typically it is energy improvement peddlers or debt help specialists that are disgraced by Britain’s data watchdog for spamming unsuspecting households, but the…

Cloudflare wants to put a firewall in front of your LLM

Claims to protect against DDoS, sensitive data leakage Cloudflare has tweaked its web application firewall (WAF) to add protections for applications using large language models.… This article has been indexed from The Register – Security Read the original article: Cloudflare…

In the vanguard of 21st century cyber threats

Everything you need to know about quantum safe encryption Webinar  The quantum threat might seem futuristic, more like something you’d encounter in a science fiction film. But it’s arguably already a danger to real cyber security defences.… This article has…

Keeping one step ahead of cyber security threats

How zero trust controls and Google AI can strengthen your organization’s defences Webinar  Dealing with cyber security incidents is an expensive business. Each data breach costs an estimated $4.35 million on average and it’s not as if the volume of…

NTT boss takes early retirement to atone for data leak

No mere mea culpa would suffice after 9.2 million records leaked over a decade, warnings were ignored, and lies were told NTT West president Masaaki Moribayashi announced his resignation on Thursday, effective at the end of March, in atonement for…

Australian spy chief fears sabotage of critical infrastructure

And accuses a former Australian politician of having ‘sold out their country’ The director general of security at Australia’s Security Intelligence Organisation (ASIO) has delivered his annual threat assessment, revealing ongoing attempts by adversaries to map digital infrastructure with a…

Palo Alto investor sues over 28% share tumble

Lawsuit alleges it misled investors with claims new AI products were ‘facilitating greater platformization’ and more Palo Alto Networks (PAN) is facing a proposed class action lawsuit that alleges investors were deceived about the traction of its platform tactics and…

China warns of fake digital currency wallets fleecing netizens

Scammers’ tactics are tiresomely familiar: get-rich-quick schemes and data harvesting China’s Ministry of Industry and Information Technology has warned local netizens that fake wallet apps for the nation’s central bank digital currency (CBDC) are already circulating and being abused by…

ALPHV/BlackCat responsible for Change Healthcare cyberattack

US government’s bounty hasn’t borne fruit as whack-a-mole game goes on The ALPHV/BlackCat ransomware gang is reportedly responsible for the massive Change Healthcare cyberattack that has disrupted pharmacies across the US since last week.… This article has been indexed from…

Everything you need to know about NIS2

Get prepared for the EU’s upgraded cybersecurity directive Webinar  The original European Union Network and Information Security (NIS) Directive certainly led to an improvement in member states’ cybersecurity defences, but it struggled to do everything required as cyberattacks and threats…

Tips on meeting complex cloud security challenges

Learn about the benefits of applying advanced automation to policy management practices Webinar  Dealing with the double trouble of relentless cyber threats and regular technology refresh cycles can stretch already overworked security practitioners. And orchestrating the transition to cloud-native applications…

Cyberattack downs pharmacies across America

Prescription orders hit after IT supplier Change Healthcare pulls plug on systems IT provider Change Healthcare has confirmed it shut down some of its systems following a cyberattack, disrupting prescription orders and other services at pharmacies across the US.… This…

Harness the power of security automation

How to ensure policy management keep up with the risks to data integrity presented by the cloud Webinar  The complexity facing businesses as they make the necessary transition to cloud-native applications and multi-cloud architectures keeps cloud teams firmly on the…

A common goal for European cyber security

Complying with the EU’s NIS2 Directive Webinar  It was growing threat levels and an increase in reported cybersecurity attacks since digitalization which pushed the European Union to introduce the original Network and Information Security (NIS) Directive in 2016.… This article…

China could be doing better at censorship, think tank finds

Complex overlapping bureaucracy sometimes lacks the funds and skills to do it right China’s censorship regime remains pervasive and far reaching, but the bureaucratic apparatus implementing it is unevenly developed and is not always well funded, according to a report…