‘The greatest concern is with spear phishing and social engineering’ Interview Now that criminals have realized there’s no need to train their own LLMs for any nefarious purposes – it’s much cheaper and easier to steal credentials and then jailbreak…
Category: The Register – Security
How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise
Cut off one head, two more grow back in its place RansomHub, the ransomware collective that emerged earlier this year, quickly gained momentum, outpacing its criminal colleagues and hitting its victims especially hard. The group named and shamed hundreds of…
Microsoft adds another problem to the Windows 11 24H2 naughty list
Santa Satya pops one more issue into his sack just in time for Christmas The trickle of known issues with Windows 11 24H2 has continued with a new one just in time for festive season: installed the operating system using…
Former NSA cyberspy’s not-so-secret hobby: Hacking Christmas lights
Rob Joyce explains how it’s done Video In 2018, Rob Joyce, then Donald Trump’s White House Cybersecurity Coordinator, gave a surprise talk at the legendary hacking conference Shmoocon about his hobby.… This article has been indexed from The Register –…
How Androxgh0st rose from Mozi’s ashes to become ‘most prevalent malware’
Botnet’s operators ‘driven by similar interests as that of the Chinese state’ After the Mozi botnet mysteriously disappeared last year, a new and seemingly more powerful botnet, Androxgh0st, rose from its ashes and has quickly become a major threat to…
What do ransomware and Jesus have in common? A birth month and an unwillingness to die
35 years since AIDS first borked a PC and we’re still no closer to a solution Feature Your Christmas holidays looked quite different in the ’80s to how they do today. While some will remember what it was like to…
One third of adults can’t delete device data
Easier to let those old phones gather dust in a draw, survey finds The UK’s Information Commissioner’s Office (ICO) has warned that many adults don’t know how to wipe their old devices, and a worrying number of young people just…
‘That’s not a bug, it’s a feature’ takes on a darker tone when malware’s involved
Mummy, where do zero days come from? Opinion One of the charms of coding is that malice can be indistinguishable from incompetence. Last week’s Who, Me? story about financial transfer test software running amok is a case in point.… This…
Suspected LockBit dev, facing US extradition, ‘did it for the money’
Dual Russian-Israeli national arrested in August An alleged LockBit ransomware developer is in custody in Israel and awaiting extradition to the United States.… This article has been indexed from The Register – Security Read the original article: Suspected LockBit dev,…
UK ICO not happy with Google’s plans to allow device fingerprinting
Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more in brief Google has announced plans to allow its business customers to begin “fingerprinting” users next year, and the UK Information Commissioner’s Office (ICO) isn’t…
Infosec experts divided on AI’s potential to assist red teams
Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence CANALYS FORUMS APAC Generative AI is being enthusiastically adopted in almost every field, but infosec experts are divided on whether it is truly helpful for…
Don’t fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish
Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns Unknown criminals went on a phishing expedition that targeted about 20,000 users across the automotive, chemical and industrial compound manufacturing sectors in Europe, and tried…
US reportedly mulls TP-Link router ban over national security risk
It could end up like Huawei -Trump’s gonna get ya, get ya, get ya The Feds may ban the sale of TP-Link routers in the US over ongoing national security concerns about Chinese-made devices being used in cyberattacks.… This article…
Microsoft won’t let customers opt out of passkey push
Enrolment invitations will continue until security improves Microsoft last week lauded the success of its efforts to convince customers to use passkeys instead of passwords, without actually quantifying that success.… This article has been indexed from The Register – Security…
Boffins trick AI model into giving up its secrets
All it took to make an Google Edge TPU give up model hyperparameters was specific hardware, a novel attack technique … and several days Computer scientists from North Carolina State University have devised a way to copy AI models running…
Phishers cast wide net with spoofed Google Calendar invites
Not that you needed another reason to enable the ‘known senders’ setting Criminals are spoofing Google Calendar emails in a financially motivated phishing expedition that has already affected about 300 organizations with more than 4,000 emails sent over four weeks,…
Interpol wants everyone to stop saying ‘pig butchering’
Victim’s feelings might get hurt, global cops contend, and that could hinder reporting Interpol wants to put an end to the online scam known as “pig butchering” through linguistic policing rather than law enforcement.… This article has been indexed from…
Critical security hole in Apache Struts under exploit
You applied the patch that could stop possible RCE attacks last week, right? A critical security hole in Apache Struts 2, patched last week, is now being exploited using publicly available proof-of-concept (PoC) code.… This article has been indexed from…
Ireland fines Meta for 2018 ‘View As’ breach that exposed 30M accounts
€251 million? Zuck can find that in his couch cushions, but Meta still vows to appeal It’s been six years since miscreants abused some sloppy Facebook code to steal access tokens belonging to 30 million users, and the slow-turning wheels…
BlackBerry offloads Cylance’s endpoint security products to Arctic Wolf
Fresh attempt to mix the perfect cocktail of IoT and Infosec BlackBerry’s ambition to mix infosec and the Internet of Things has been squeezed, after the Canadian firm announced it is offloading Cylance’s endpoint security products.… This article has been…