Plus: CISA pulls plug on couple of systems feared compromised There’s yet another group of miscreants out there hijacking insecure Ivanti devices: A new, financially motivated gang dubbed Magnet Goblin has emerged from the shadowy digital depths with a knack…
Category: The Register – Security
Microsoft confirms Russian spies stole source code, accessed internal systems
Still “no evidence” of any compromised customer-facing systems, we’re told Microsoft has now confirmed that the Russian cyberspies who broke into its executives’ email accounts stole source code and gained access to internal systems. The Redmond giant has characterized the…
Change Healthcare registers pulse after crippling ransomware attack
Remaining services are expected to return in the coming weeks after $22M ALPHV ransom Change Healthcare has taken the first steps toward a full recovery from the ransomware attack in February by bringing its electronic prescription services back online.… This…
Swiss cheese security? Play ransomware gang milks government of 65,000 files
Classified docs, readable passwords, and thousands of personal information nabbed in Xplain breach The Swiss government had around 65,000 files related to it stolen by the Play ransomware gang during an attack on an IT supplier, its National Cyber Security…
Font security ‘still a Helvetica of a problem’ says Australian graphics outfit Canva
Who knew that unzipping a font archive could unleash a malicious file Online graphic design platform Canva went looking for security problems in fonts, and found three – in “strange places.”… This article has been indexed from The Register –…
Securing open source software: Whose job is it, anyway?
CISA announces more help, and calls on app makers to step up The US government and some of the largest open source foundations and package repositories have announced a series of initiatives intended to improve software supply-chain security, while also…
We’re not Meta support: State AGs tell Zuck to fix rampant account takeover problem
‘We refuse to operate as customer service representatives’ A group of 41 US state attorneys general, tired of serving as a customer complaint clearinghouse for Facebook and Instagram users, have sent a letter to Meta asking it to figure out…
Possible China link to Change Healthcare ransomware attack
Alleged crim bought SmartScreen Killer, Cobalt Strike on dark-web markets A criminal claiming to be an ALPHV/BlackCat affiliate — the gang responsible for the widely disruptive Change Healthcare ransomware infection last month — may have ties to Chinese government-backed cybercrime…
JetBrains TeamCity under attack by ransomware thugs after disclosure mess
More than 1,000 servers remain unpatched and vulnerable Security researchers are increasingly seeing active exploit attempts using the latest vulnerabilities in JetBrains’ TeamCity that in some cases are leading to ransomware deployment.… This article has been indexed from The Register…
Belgian ale legend Duvel’s brewery borked as ransomware halts production
Company reassures public it has enough beer, expects quick recovery before weekend Belgian beer brewer Duvel says a ransomware attack has brought its facility to a standstill while its IT team works to remediate the damage.… This article has been…
Belgian ale legend Duvel’s brewery borked as ransomware halts production
Company reassures public it has enough beer, expects quick recovery before weekend Belgian beer brewer Duvel says a ransomware attack has brought its facility to a standstill while its IT team works to remediate the damage.… This article has been…
VMware urges emergency action to blunt hypervisor flaws
Critical vulns in USB under ESXi and desktop hypervisors found by Chinese researchers at cracking contest Hypervisors are supposed to provide an inviolable isolation layer between virtual machines and hardware. But hypervisor heavyweight VMware by Broadcom yesterday revealed its hypervisors…
US lawmakers want ByteDance to divest TikTok or face a ban
The American mind must not be at the mercy of Chinese algorithms A group of US lawmakers introduced legislation on Tuesday that, if passed, would force Chinese internet concern ByteDance to divest TikTok – its most valuable property – or…
Here’s something else AI can do: expose bad infosec to give cyber-crims a toehold in your organization
Singaporean researchers note rising presence of ChatGPT creds in Infostealer malware logs Stolen ChatGPT credentials are a hot commodity on the dark web, according to Singapore-based threat intelligence firm Group-IB, which claims to have found some 225,000 stealer logs containing…
Lawsuit claims gift card fraud is the gift that keeps on giving, to Google
Play Store commissions are a nice little earner, wherever they come from Google has been accused of profiting from gift card scams.… This article has been indexed from The Register – Security Read the original article: Lawsuit claims gift card…
Chinese chap charged with stealing Google’s AI datacenter secrets
Moonlighted for PRC companies after side-stepping Big G’s security, allegedly The US Department of Justice on Wednesday revealed an indictment that charges a former Google employee with leaking the ad giant’s AI tech to two Chinese companies – after easily…
FBI: Critical infrastructure suffers spike in ransomware attacks
Jump in overall cybercrime reports, $60M-plus reportedly lost to extortionists alone, Feds reckon Digital crimes potentially cost victims more than $12.5 billion last year, according to the FBI’s latest Internet Crime Complaint Center (IC3) annual report. … This article has been…
FBI: Critical infrastructure menaced by spike in ransomware attacks
Jump in overall cybercrime reports, $60M-plus reportedly lost to extortionists alone, Feds reckon Digital crimes potentially cost victims more than $12.5 billion last year, according to the FBI’s latest Internet Crime Complaint Center (IC3) annual report. … This article has been…
Apple’s trademark tight lips extend to new iPhone, iPad zero-days
Two flaws fixed, one knee bent to the EU, and a budding cybersecurity star feature in iOS 17.4 Apple’s latest security patches address four vulnerabilities affecting iOS and iPadOS, including two zero-days that intel suggests attackers have already exploited.… This…
Capita says 2023 cyberattack costs a factor as it reports staggering £100M+ loss
Additional cost-cutting measures announced sparking fears of further job cuts Outsourcing giant Capita today reported a net loss of £106.6 million ($135.6 million) for calendar 2023, with the costly cyberattack by criminals making a hefty dent in its annual financials.……
Chip lobby group SEMI to EU: Export restrictions should only be used in self-defense
Please don’t scare away foreign investors – who do you think pays for this stuff? SEMI, an industry association representing 3,000 chip vendors, would really appreciate it if the European Union would back off plans to impose export controls on…
Japan orders local giants LINE and NAVER to disentangle their tech stacks
Government mighty displeased about a shared Active Directory that led to a big data leak Japan’s government has ordered local tech giants LINE and NAVER to disentangle their tech stacks, after a data breach saw over 510,000 users’ data exposed.……
Uncle Sam intervenes as Change Healthcare ransomware fiasco creates mayhem
As the crooks behind the attack – probably ALPHV/BlackCat – fake their own demise The US government has stepped in to help hospitals and other healthcare providers affected by the Change Healthcare ransomware infection, offering more relaxed Medicare rules and…
Fidelity customers’ financial info feared stolen in suspected ransomware attack
Insurance giant blames Infosys, LockBit claims credit Criminals have probably stolen nearly 30,000 Fidelity Investments Life Insurance customers’ personal and financial information — including bank account and routing numbers, credit card numbers and security or access codes — after breaking…
US accuses Army vet cyber-Casanova of sharing Russia-Ukraine war secrets
Where better to expose confidential data than on a dating app? Yet another US military man is facing a potentially significant stretch in prison after allegedly sending secret national defense information (NDI) overseas.… This article has been indexed from The…
IP address X-posure now a feature on Musk’s social media platform
If you’re still on X you’d better disable this insecure-by-default calling feature, lest someone snatch your IP Video and audio calling features for X Premium users added last year to Elon Musk’s version of Twitter have been expanded to everyone…
Rapid7 throws JetBrains under the bus for ‘uncoordinated vulnerability disclosure’
Exploits began within hours of the original disclosure, so patch now Security shop Rapid7 is criticizing JetBrains for flouting its policy against silent patching regarding fixes for two fresh vulnerabilities in the TeamCity CI/CD server.… This article has been indexed…
Spam crusade lands charity in hot water with data watchdog
Penny Appeal sent more than 460,000 texts asking for money to help war-torn countries, no opt out Typically it is energy improvement peddlers or debt help specialists that are disgraced by Britain’s data watchdog for spamming unsuspecting households, but the…
Cloudflare wants to put a firewall in front of your LLM
Claims to protect against DDoS, sensitive data leakage Cloudflare has tweaked its web application firewall (WAF) to add protections for applications using large language models.… This article has been indexed from The Register – Security Read the original article: Cloudflare…
American Express admits card data exposed and blames third party
Don’t leave home without … IT security A security failure at a third-party vendor exposed an untold number of American Express card numbers, expiry dates, and other data to persons unknown.… This article has been indexed from The Register –…
Change Healthcare attack latest: ALPHV bags $22M in Bitcoin amid affiliate drama
No honor among thieves? ALPHV/BlackCat, the gang behind the Change Healthcare cyberattack, has received more than $22 million in Bitcoin in what might be a ransomware payment.… This article has been indexed from The Register – Security Read the original…
Seoul accuses North Korea of stealing southern chipmakers’ designs
Kim Jong Un’s all in for home-built silicon says warning North Korean government spies have broken into the servers of at least two chipmakers and stolen product designs as part of attempts to spur Kim Jong Un’s plans for a…
German defense chat overheard by Russian eavesdroppers on Cisco’s WebEx
Officials can’t tell whether the tape was edited, but fear Kremlin has more juicy bits to release in the future The German Ministry of Defense (Bundeswehr) has confirmed that a recording of a call between high-ranking officials discussing war efforts…
Ransomware ban backers insist thugs must be cut off from payday
Increasingly clear number of permanent solutions is narrowing Global law enforcement authorities’ attempts to shutter the LockBit ransomware crew have sparked a fresh call for a ban on ransomware payments to perpetrators.… This article has been indexed from The Register…
The federal bureau of trolling hits LockBit, but the joke’s on us
When you can’t lock ’em up, lock ’em out Opinion The best cop shows excel at mind games: who’s tricking whom, who really wins, and what price they pay. A twist of humor adds to the drama and keeps us…
LockBit’s contested claim of fresh ransom payment suggests it’s been well hobbled
ALSO: CISA warns Ivanti vuln mitigations might not work, SAML hijack doesn’t need ADFS, and crit vulns Infosec in brief The infamous LockBit ransomware gang has been busy in the ten days since an international law enforcement operation took down…
Ahead of Super Tuesday, US elections face existential and homegrown threats
Misinformation is rife, AI makes it easier to create, and 42 percent of the planet’s inhabitants get to vote this year Feature Two US intelligence bigwigs last week issued stark warnings about foreign threats to American election integrity and security…
Air National Guardsman Teixeira to admit he was Pentagon files leaker
Turns out bragging on Discord has unfortunate consequences Jack Teixeira, the Air National Guardsman accused of leaking dozens of classified Pentagon documents, is expected to plead guilty in a US court on Monday.… This article has been indexed from The…
Judge orders NSO to cough up Pegasus super-spyware source code
/* Hope no one ever reads these functions lmao */ NSO Group, the Israel-based maker of super-charged snoopware Pegasus, has been ordered by a federal judge in California to share the source code for “all relevant spyware” with Meta’s WhatsApp.……
Iranian charged over attacks against US defense contractors, government agencies
$10M bounty for anyone with info leading to Alireza Shafie Nasab’s identification or location The US Department of Justice has unsealed an indictment accusing an Iranian national of a years-long campaign that compromised hundreds of thousands of accounts and attempting…
In the vanguard of 21st century cyber threats
Everything you need to know about quantum safe encryption Webinar The quantum threat might seem futuristic, more like something you’d encounter in a science fiction film. But it’s arguably already a danger to real cyber security defences.… This article has…
Cops visit school of ‘wrong person’s child,’ mix up victims and suspects in epic data fail
Data watchdog reprimands police force for confusing 2 people with same name and birthday to disastrous results The UK’s Information Commissioner’s Office has put the West Midlands Police (WMP) on the naughty step after the force was found to have…
Cops visit school of ‘wrong person’s child,’ mix up victims and suspects in epic data fail
Data watchdog reprimands police force for mixing up 2 people with same name and birthday with disastrous results The UK’s Information Commissioner’s Office has put the West Midlands Police (WMP) on the naughty step after the force was found to…
Keeping one step ahead of cyber security threats
How zero trust controls and Google AI can strengthen your organization’s defences Webinar Dealing with cyber security incidents is an expensive business. Each data breach costs an estimated $4.35 million on average and it’s not as if the volume of…
NTT boss takes early retirement to atone for data leak
No mere mea culpa would suffice after 9.2 million records leaked over a decade, warnings were ignored, and lies were told NTT West president Masaaki Moribayashi announced his resignation on Thursday, effective at the end of March, in atonement for…
GitHub struggles to keep up with automated malicious forks
Cloned then compromised, bad repos are forked faster than they can be removed A malware distribution campaign that began last May with a handful of malicious software packages uploaded to the Python Package Index (PyPI) has spread to GitHub and…
Turns out cops are super interested in subpoenaing suspects’ push notifications
Those little popups may reveal location, device details, IP address, and more More than 130 petitions seeking access to push notification metadata have been filed in US courts, according to a Washington Post investigation – a finding that underscores the…
US courts fielded over 130 requests for access to push notification metadata
Cops love it because popup messages can reveal location, device details, IP address and more More than 130 petitions seeking access to push notification metadata have been filed in US courts, according to a Washington Post investigation – a finding…
White House goes to court, not Congress, to renew warrantless spy powers
Choose your own FISA Section 702 adventure: End-run around lawmakers or business as usual? The Biden Administration has asked a court, rather than Congress, to renew controversial warrantless surveillance powers used by American intelligence and due to expire within weeks.…
Chinese ‘connected’ cars are a national security threat, says Biden
No Chinese automakers sell cars in the US, but the feds are still going to investigate whether they’re a threat Concerned over the chance that Chinese-made cars could pose a future threat to national security, Biden’s administration is proposing plans…
Ransomware gangs are paying attention to infostealers, so why aren’t you?
Analysts warn of big leap in cred-harvesting malware activity last year There appears to be an uptick in interest among cybercriminals in infostealers – malware designed to swipe online account passwords, financial info, and other sensitive data from infected PCs…
Meta’s pay-or-consent model hides ‘massive illegal data processing ops’: lawsuit
GDPR claim alleges Facebook parent’s ‘commercial surveillance practices are fundamentally illegal’ Consumer groups are filing legal complaints in the EU in a coordinated attempt to use data protection law to stop Meta from giving local users a “fake choice” between…
Chinese PC-maker Acemagic customized its own machines to get infected with malware
Tried to speed boot times, maybe by messing with ‘Windows source code’, ended up building a viral on-ramp Chinese PC maker Acemagic has admitted some of its products shipped with pre-installed malware.… This article has been indexed from The Register…
Australian spy chief fears sabotage of critical infrastructure
And accuses a former Australian politician of having ‘sold out their country’ The director general of security at Australia’s Security Intelligence Organisation (ASIO) has delivered his annual threat assessment, revealing ongoing attempts by adversaries to map digital infrastructure with a…
ALPHV/BlackCat claims responsibility for Change Healthcare attack
Brags it lifted 6TB of data, but let’s remember these people are criminals and not worthy of much trust The ALPHV/BlackCat cybercrime gang has taken credit – if that’s the word – for a ransomware infection at Change Healthcare that…
BEAST AI needs just a minute of GPU time to make an LLM fly off the rails
Talk about gone in 60 seconds Computer scientists have developed an efficient way to craft prompts that elicit harmful responses from large language models (LLMs).… This article has been indexed from The Register – Security Read the original article: BEAST…
BEAST AI needs just a minute of GPU time to make an LLM fly over its safety guardrails
Talk about gone in 60 seconds Computer scientists at the University of Maryland have developed an efficient way to craft prompts that elicit harmful responses from large language models (LLMs).… This article has been indexed from The Register – Security…
Gone in 60 seconds: BEAST AI model attack needs just a minute of GPU time to breach LLM guardails
Scientists reveal automated adversarial prompt generation too powered Nvidia visualization accelerator Computer scientists from the University of Maryland have developed an efficient way to generate adversarial attack phrases that elicit harmful responses from large language models (LLMs).… This article has…
Palo Alto investor sues over 28% share tumble
Lawsuit alleges it misled investors with claims new AI products were ‘facilitating greater platformization’ and more Palo Alto Networks (PAN) is facing a proposed class action lawsuit that alleges investors were deceived about the traction of its platform tactics and…
Uncle Sam tells nosy nations to keep their hands off Americans’ personal data
Biden readies executive order targeting China, Russia, and pals US President Joe Biden is expected to sign an executive order today that aims to prevent the sale or transfer of Americans’ sensitive personal information and government-related data to adversarial countries…
That home router botnet the Feds took down? Moscow’s probably going to try again
Non-techies told to master firmware upgrades and firewall rules. For the infosec hardheads: have some IOCs Authorities from eleven nations have delivered a sequel to the January takedown of a botnet run by Russia on compromised Ubiquiti Edge OS routers…
Sandvine put on America’s export no-fly list after Egypt used network tech for spying
Canadian network box maker floats in denial The US Commerce Department has blacklisted Sandvine for selling its networking monitoring technology to Egypt, where the Feds say the gear was used to spy on political and human-rights activists.… This article has…
Sandvine put on America’s export no-fly list for flogging snoop-ware to Egypt
Canadian network box maker floats denial The US Commerce Department has blacklisted Sandvine for selling its networking monitoring technology to Egypt, where the Feds say the gear was used to spy on political and human-rights activists.… This article has been…
NIST updates Cybersecurity Framework after a decade of lessons
The original was definitely getting a bit long in the tooth for modern challenges After ten years operating under the original model, and two years working to revise it, the National Institute of Standards and Technology (NIST) has released version…
Cybercrims: When we hit IT, they sometimes pay, but when we hit OT… jackpot
Or so says opsec firm, which confirms 70% of all industrial org ransomware in 2023 targeted manufacturers Analysis Cybercriminals follow the money, and increasingly last year that led them to ransomware attacks against the manufacturing industry.… This article has been…
Broadcom builds a better SASE out of VMware VeloCloud and Symantec
First integration across properties, as end user compute division readies to leave home Broadcom has delivered on its 2023 teaser of integration between VMware’s SD-WAN and Symantec’s Security Service Edge, by today debuting the “VMware VeloCloud SASE, Secured by Symantec”…
China warns of fake digital currency wallets fleecing netizens
Scammers’ tactics are tiresomely familiar: get-rich-quick schemes and data harvesting China’s Ministry of Industry and Information Technology has warned local netizens that fake wallet apps for the nation’s central bank digital currency (CBDC) are already circulating and being abused by…
Nevada sues to deny kids access to Meta’s Messenger encryption
State government says it’s thinking of the children A law firm acting on behalf of the Nevada Attorney General Aaron Ford has asked a state court to issue a temporary restraining order (TRO) denying minors access to encrypted communication in…
ALPHV/BlackCat responsible for Change Healthcare cyberattack
US government’s bounty hasn’t borne fruit as whack-a-mole game goes on The ALPHV/BlackCat ransomware gang is reportedly responsible for the massive Change Healthcare cyberattack that has disrupted pharmacies across the US since last week.… This article has been indexed from…
Back from the dead: LockBit taunts cops, threatens to leak Trump docs
Officials have until March 2 to cough up or stolen data gets leaked LockBit claims it’s back in action just days after an international law enforcement effort seized the ransomware gang’s servers and websites, and retrieved more than 1,000 decryption…
LockBit back from the dead – taunts cops and plans to leak Trump docs
Countdown expires March 2 unless government officials pay the ransom LockBit claims it’s back in action just days after an international law enforcement effort seized the ransomware gang’s servers and websites, and retrieved more than 1,000 decryption keys to assist…
Everything you need to know about NIS2
Get prepared for the EU’s upgraded cybersecurity directive Webinar The original European Union Network and Information Security (NIS) Directive certainly led to an improvement in member states’ cybersecurity defences, but it struggled to do everything required as cyberattacks and threats…
Data watchdog tells off outsourcing giant for scanning staff biometrics despite ‘power imbalance’
2,000 employees at 38 facilities had data processed ‘unlawfully’, ICO says A data protection watchdog in the UK has issued an enforcement notice to stop Serco from using facial recognition tech and fingerprint scanning to monitor staff at 38 leisure…
Fox News ‘hacker’ turns out to be journalist whose lawyers say was doing his job
Also, another fake iOS app slips into the store, un-cybersafe EV chargers leave UK shelves, and critical vulns in brief A Florida journalist has been arrested and charged with breaking into protected computer systems in a case his lawyers say…
Security is hard because it has to be right all the time? Yeah, like everything else
It takes only one bottleneck or single point of failure to ruin your week Systems Approach One refrain you often hear is that security must be built in from the ground floor; that retrofitting security to an existing system is…
LockBit extorted billions of dollars from victims, fresh leaks suggest
Investigating LockBit’s finances has blown previous estimates of the operation’s wealth out of the water Authorities digging into LockBit’s finances believe the group may have generated more than $1 billion in ransom fees over its four-year lifespan.… This article has…
U-Haul tells 67K customers that cyber-crooks drove away with their personal info
Thieves broke into IT system using stolen login U-Haul is alerting tens of thousands of folks that miscreants used stolen credentials to break into one of its systems and access customer records that contained some personal data.… This article has…
LockBit identity reveal a bigger letdown than Game of Thrones Season 8
NCA still left enough for onlookers to wonder if there’s anything more to come The grand finale of the week of LockBit leaks was slated to expose the real identity of LockBitSupp – the alias of the gang’s public spokesperson…
Tips on meeting complex cloud security challenges
Learn about the benefits of applying advanced automation to policy management practices Webinar Dealing with the double trouble of relentless cyber threats and regular technology refresh cycles can stretch already overworked security practitioners. And orchestrating the transition to cloud-native applications…
X protests forced suspension of accounts on orders of India’s government
Nonprofit SFLC links orders to farming protests The global government affairs team at X (née Twitter) has suspended some accounts and posts in India after receiving executive orders to do so from the country’s government, backed by threat of penalties…
Avast shells out $17M to shoo away claims it peddled people’s personal data
A name that’s commonly shouted by pirates might be a clue, me hearties! Avast has agreed to cough up $16.5 million after the FTC accused the antivirus vendor of selling customer information to third parties.… This article has been indexed…
Cyberattack downs pharmacies across America
Prescription orders hit after IT supplier Change Healthcare pulls plug on systems IT provider Change Healthcare has confirmed it shut down some of its systems following a cyberattack, disrupting prescription orders and other services at pharmacies across the US.… This…
Authorities dismantled LockBit before it could unleash revamped variant
New features aimed to stamp out problems of the past Law enforcement’s disruption of the LockBit ransomware crew comes as the criminal group was working on bringing a brand-new variant to market, research reveals.… This article has been indexed from…
Ukrainian police arrest father and son in suspected LockBit affiliate double act
If they did it, it gives new meaning to quality family time. Meanwhile, key LockBit leaders remain at large Today’s edition of the week-long LockBit leaks reveals a father-son duo was apprehended in Ukraine as part of the series of…
Giant leak reveals Chinese infosec vendor I-Soon is one of Beijing’s cyber-attackers for hire
Trove reveals RATs that can pop major OSes, campaigns against offshore and local targets A cache of stolen document posted to GitHub appears to reveal how a Chinese infosec vendor named I-Soon offers rent-a-hacker services for Beijing.… This article has…
Biden asks Coast Guard to create an infosec port in a stormy sea of cyber threats
Oh hear us when we cry to thee for those in peril on the sea President Biden has empowered the US Coast Guard (USCG) to get a tighter grip on cybersecurity at American ports – including authorizing yet another incident…
Duo face 20 years in prison over counterfeit iPhone scam
Sent 5,000+ fake handsets to Apple for repair in hope of getting real ones back Two Chinese nationals are facing a maximum of 20 years in prison after being convicted of mailing thousands of fake iPhones to Apple for repair…
Apple promises to protect iMessage chats from quantum computers
Easy to defend against stuff that may never actually work – oh there we go again, being all cynical like Apple says it’s going to upgrade the cryptographic protocol used by iMessage to hopefully prevent the decryption of conversations by…
Exploiting the latest max-severity ConnectWise bug is ’embarrassingly easy’
Urgent patching advised to protect attacks against setup wizards Infosec researchers say urgent patching of the latest remote code execution (RCE) vulnerability in ConnectWise’s ScreenConnect is required given its maximum severity score.… This article has been indexed from The Register…
LockBit leaks expose nearly 200 affiliates and bespoke data-stealing malware
Operation Cronos’s ‘partners’ continue to trickle the criminal empire’s secrets The latest revelation from law enforcement authorities in relation to this week’s LockBit leaks is that the ransomware group had registered nearly 200 “affiliates” over the past two years.… This…
Harness the power of security automation
How to ensure policy management keep up with the risks to data integrity presented by the cloud Webinar The complexity facing businesses as they make the necessary transition to cloud-native applications and multi-cloud architectures keeps cloud teams firmly on the…
Orgs are having a major identity crisis while crims reap the rewards
Hacking your way in is so 2022 – logging in is much easier Identity-related threats pose an increasing risk to those protecting networks because attackers – ranging from financially motivated crime gangs and nation-state backed crews – increasingly prefer to…
A common goal for European cyber security
Complying with the EU’s NIS2 Directive Webinar It was growing threat levels and an increase in reported cybersecurity attacks since digitalization which pushed the European Union to introduce the original Network and Information Security (NIS) Directive in 2016.… This article…
Europe’s data protection laws cut data storage by making information-wrangling pricier
GDPR also slashed processing costs by over a quarter Europe’s General Data Protection Regulation (GDPR) has led European firms to store and process less data, recent economic research suggests, because the privacy rules are making data more costly to manage.……
China could be doing better at censorship, think tank finds
Complex overlapping bureaucracy sometimes lacks the funds and skills to do it right China’s censorship regime remains pervasive and far reaching, but the bureaucratic apparatus implementing it is unevenly developed and is not always well funded, according to a report…
Singapore’s monetary authority advises banks to get busy protecting against quantum decryption
No time like the present, says central bank The Monetary Authority of Singapore (MAS) advised on Monday that financial institutions need to stay agile enough to adopt post-quantum cryptography (PQC) and quantum key distribution (QKD) technology, without significantly impacting systems…
Cops turn LockBit ransomware gang’s countdown timers against them
Authorities dismantle cybercrime royalty by making mockery of their leak site In seizing and dismantling LockBit’s infrastructure, Western authorities are now making a mockery of the ransomware criminals by promising a long, drawn-out disclosure of its secrets.… This article has…
Cops turn LockBit’s ransomware gang’s countdown timers against them
Authorities dismantle cybercrime royalty by making mockery of their leak site In seizing and dismantling LockBit’s infrastructure, Western authorities are now making a mockery of the ransomware criminals by promising a long, drawn-out disclosure of its secrets.… This article has…
Wyze admits 13,000 users could have viewed strangers’ camera feeds
Customers report feeling violated following the security snafu Smart home security camera slinger Wyze is telling customers that a cybersecurity “incident” allowed thousands of users to see other people’s camera feeds.… This article has been indexed from The Register –…
Insider steals 79,000 email addresses at work to promote own business
After saying they’re very sorry, they escape with a slap on the wrist A former council staff member in the district where William Shakespeare was born ransacked databases filled with residents’ information to help drum up new business for their…