CEO of Cloud Software a ‘special government employee’ probing through IT for Elon Musk’s DOGE The US Treasury Department has revealed Tom Krause – the chief exec of Citrix and Netscaler owner Cloud Software Group – has “read-only” access to…
Category: The Register – Security
Musky minion granted ‘read-only’ access to federal payment systems
Nothing to see here, just a ‘special government employee’ doing his job The US Treasury Department has assured Congress that a “special government employee” associated with Elon Musk’s Department of Government Efficiency (DOGE) has just “read-only” access to vital federal…
Netgear fixes critical bugs as Five Eyes warn about break-ins at the edge
International security squads all focus on stopping baddies busting in through routers, IoT kit etc Netgear is advising customers to upgrade their firmware after it patched two critical vulnerabilities affecting multiple routers.… This article has been indexed from The Register…
US cranks up espionage charges against ex-Googler accused of trade secrets heist
Mountain View clocked onto the scheme with days to spare A Chinese national faces a substantial stint in prison and heavy fines if found guilty of several additional charges related to economic espionage and theft of trade secrets at Google.……
Google: How to make any AMD Zen CPU always generate 4 as a random number
Malicious microcode vulnerability discovered, fixes rolling out for Epycs at least Googlers have not only figured out how to break AMD’s security – allowing them to load unofficial microcode into its processors to modify the silicon’s behavior as they wish…
Poisoned Go programming language package lay undetected for 3 years
Researcher says ecosystem’s auto-caching is a net positive but presents exploitable quirks A security researcher says a backdoor masquerading as a legitimate Go programming language package used by thousands of organizations was left undetected for years.… This article has been…
Grubhub serves up security incident with a side of needing to change your password
Contact info and partial payment details may be compromised US food and grocery delivery platform Grubhub says a security incident at a third-party service provider is to blame after user data was compromised.… This article has been indexed from The…
US accuses Canadian math prodigy of $65M crypto scheme
Suspect, still at large, said to back concept that ‘code is law’ New York feds today unsealed a five-count criminal indictment charging a 22-year-old Canadian math prodigy with exploiting vulnerabilities in two decentralized finance protocols, allegedly using them to fraudulently…
Cyberattack on NHS causes hospitals to miss cancer care targets
Healthcare chiefs say impact will persist for months NHS execs admit that last year’s cyberattack on hospitals in Wirral, northwest England, continues to “significantly” impact waiting times for cancer treatments, and suspect this will last for “months.”… This article has…
Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look ‘insignificant’
When cloud customers don’t clean up after themselves, part 97 Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia’s “SolarWinds adventures look amateurish and insignificant,” watchTowr Labs security…
UK govt must learn fast and let failing projects die young
Tackle longstanding issues around productivity, cyber resilience and public sector culture, advises spending watchdog The UK’s government spending watchdog has called on the current administration to make better use of technology to kickstart the misfiring economy and ensure better delivery…
Google patches odd Android kernel security bug amid signs of targeted exploitation
Also, Netgear fixes critical router, access point vulnerabilities Google has released its February Android security updates, including a fix for a high-severity kernel-level vulnerability, which is suspected to be in use by targeted exploits.… This article has been indexed from…
Why digital resilience is critical to banks
Going beyond the traditional “Prevent, Detect, and Respond” framework and taking a proactive approach Partner Content In today’s highly connected and technology-driven world, digital resilience is not just a competitive advantage for banks – it is a necessity.… This article…
TSA’s airport facial-recog tech faces audit probe
Senators ask, Homeland Security watchdog answers: Is it worth the money? The Department of Homeland Security’s Inspector General has launched an audit of the Transportation Security Administration’s use of facial recognition technology at US airports, following criticism from lawmakers and…
2 officers bailed as anti-corruption unit probes data payouts to N Irish cops
Investigating compensation to police whose sensitive info was leaked in 2023 The Police Service of Northern Ireland (PSNI) has bailed two officers after they were arrested as part of a fraud investigation related to the payments to cops whose sensitive…
Privacy Commissioner warns the ‘John Smiths’ of the world can acquire ‘digital doppelgangers’
Australian government staff mixed medical info for folk who share names and birthdays Australia’s privacy commissioner has found that government agencies down under didn’t make enough of an effort to protect data describing “digital doppelgangers” – people who share a…
Medical monitoring machines spotted stealing patient data, users warned to pull the plug ASAP
PLUS: MGM settles breach suits; AWS doesn’t trust you with security defaults; A new .NET backdoor; and more Infosec in brief The United States Food and Drug Administration has told medical facilities and caregivers that monitor patients using Contec equipment…
What does it mean to build in security from the ground up?
As if secure design is the only bullet point in a list of software engineering best practices Systems Approach As my Systems Approach co-author Bruce Davie and I think through what it means to apply the systems lens to security,…
Gilmore Girls fans nabbed as Eurocops dismantle two major cybercrime forums
Nulled and Cracked had a Lorelai-cal rise – until Operation Talent stepped in Law enforcement officers across Europe assembled again to collectively disrupt major facilitators of cybercrime, with at least one of those cuffed apparently a fan of the dramedy…
The Big Short on Cybersecurity
How to communicate risk to executives Partner Content Have you ever watched ? It’s one of my all-time favorite movies, not just for the story but for how it handles complexity.… This article has been indexed from The Register –…