Category: The Register – Security

Cops arrest suspected admin of German-language crime bazaar

Drugs, botnets, forged docs, and more generated fortune for platform sellers German authorities say they have again shut down the perhaps unwisely named Crimenetwork platform and arrested a suspected admin.… This article has been indexed from The Register – Security…

Discover the future of Linux security

Explore open source strategies to safeguard critical systems and data Webinar  Linux security is a component that sits at the heart of today’s IT landscape.… This article has been indexed from The Register – Security Read the original article: Discover…

RansomHub claims to net data hat-trick against Bologna FC

Crooks say they have stolen sensitive files on managers and players Italian professional football club Bologna FC is allegedly a recent victim of the RansomHub cybercrime gang, according to the group’s dark web postings.… This article has been indexed from…

Zabbix urges upgrades after critical SQL injection bug disclosure

US agencies blasted ‘unforgivable’ SQLi flaws earlier this year Open-source enterprise network and application monitoring provider Zabbix is warning customers of a new critical vulnerability that could lead to full system compromise.… This article has been indexed from The Register…

Fighting cybercrime with actionable knowledge

A reason to celebrate SANS and its 35 years of cyber security training Sponsored Post  Cybercrime never sleeps. As threats continue to evolve and attack surfaces become broader and harder to defend, it has never been more important for the…

Salt Typhoon’s surge extends far beyond US telcos

Plus, a brand-new backdoor, GhostSpider, is linked to the cyber-spy crew’s operations The reach of the China-linked Salt Typhoon gang extends beyond American telecommunications giants, and its arsenal includes several backdoors, including a brand-new malware dubbed GhostSpider, according to Trend…

Bolster resilience against 2025 cyber threats

Watch this webinar to learn why cybersecurity leaders can trust the MITRE ATT&CK Evaluations Partner Content  In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect…

Data broker leaves 600K+ sensitive files exposed online

Researcher spotted open database before criminals … we hope Exclusive  More than 600,000 sensitive files containing thousands of people’s criminal histories, background checks, vehicle and property records were exposed to the internet in a non-password protected database belonging to data…

First-ever UEFI bootkit for Linux in the works, experts say

Bootkitty doesn’t bite… yet Security researchers say they’ve stumbled upon the first-ever UEFI bootkit targeting Linux, illustrating a key moment in the evolution of such tools.… This article has been indexed from The Register – Security Read the original article:…

Automating endpoint management

Addressing the challenges of patching and vulnerability remediation Webinar  Managing endpoints efficiently has perhaps never been more important or more complex. … This article has been indexed from The Register – Security Read the original article: Automating endpoint management

The workplace has become a surveillance state

Cracked Labs report explores the use of motion sensors and wireless networking kit to monitor offices Office buildings have become like web browsers – they’re full of tracking technology, a trend documented in a report out this week by Cracked…

US senators propose law to require bare minimum security standards

In case anyone forgot about Change Healthcare American hospitals and healthcare organizations would be required to adopt multi-factor authentication (MFA) and other minimum cybersecurity standards under new legislation proposed by a bipartisan group of US senators. … This article has been…

Fortify your data

How cyber resilient storage hardware can defeat ransomware Sponsored Feature  Ransomware is everywhere. The FBI and CISA just issued yet another advisory about it.… This article has been indexed from The Register – Security Read the original article: Fortify your…

QNAP and Veritas dump 30-plus vulns over the weekend

Just what you want to find when you start a new week Taiwanese NAS maker QNAP addressed 24 vulnerabilities across various products over the weekend.… This article has been indexed from The Register – Security Read the original article: QNAP…

Andrew Tate’s site ransacked, subscriber data stolen

He’ll just have to take this one on the chin The website of self-proclaimed misogynist and alleged sex trafficker and rapist Andrew Tate has been compromised and data on its paying subscribers stolen.… This article has been indexed from The…

How to master endpoint security

Get some advice from this discussion with a Kaseya expert Webinar  Want to access the key takeaways from the recent “Secure Everything for Every Endpoint” webinar?… This article has been indexed from The Register – Security Read the original article:…

Chinese ship casts shadow over Baltic subsea cable snipfest

Danish military confirms it is monitoring as Swedish police investigate. Cloudflare says impact was ‘minimal’ The Danish military has confirmed it is tracking a Chinese ship that is under investigation after two optical fiber internet cables under the Baltic Sea…

DARPA-backed voting system for soldiers abroad savaged

VotingWorks, developer of the system, disputes critics’ claims An electronic voting project backed by DARPA – Uncle Sam’s boffinry nerve center – to improve the process of absentee voting for American military personnel stationed abroad has been slammed by security…

Join in the festive cybersecurity fun

Get hands-on cybersecurity training this seasonal challenge Sponsored Post  Are you ready to pit your wits against the cyber exercises featured in the Holiday Hack Challenge 2024: Snow-maggedon?… This article has been indexed from The Register – Security Read the…

Deepen your knowledge of Linux security

Event  The security landscape is constantly shifting. If you’re running Linux, staying ahead may rely on understanding the challenges – and opportunities – unique to Linux environments.… This article has been indexed from The Register – Security Read the original…

Will passkeys ever replace passwords? Can they?

Here’s why they really should Systems Approach  I have been playing around with passkeys, or as they are formally known, discoverable credentials.… This article has been indexed from The Register – Security Read the original article: Will passkeys ever replace…

Rust haters, unite! Fil-C aims to Make C Great Again

It’s memory-safe, with a few caveats Developers looking to continue working in the C and C++ programming languages amid the global push to promote memory-safe programming now have another option that doesn’t involve learning Rust.… This article has been indexed…

Swiss cheesed off as postal service used to spread malware

QR codes arrive via an age-old delivery system Switzerland’s National Cyber Security Centre (NCSC) has issued an alert about malware being spread via the country’s postal service.… This article has been indexed from The Register – Security Read the original…

Letting chatbots run robots ends as badly as you’d expect

LLM-controlled droids easily jailbroken to perform mayhem, researchers warn Science fiction author Isaac Asimov proposed three laws of robotics, and you’d never know it from the behavior of today’s robots or those making them.… This article has been indexed from…

Simplifying endpoint security

Discover unified strategies to secure and manage all endpoints across your organization Webinar  As organizations expand their digital footprint, the range of endpoints – spanning from laptops to IoT devices – continues to grow.… This article has been indexed from…

Microsoft Power Pages misconfigurations exposing sensitive data

NHS supplier that leaked employee info fell victim to fiddly access controls that can leave databases dangling online Private businesses and public-sector organizations are unwittingly exposing millions of people’s sensitive information to the public internet because they misconfigure Microsoft’s Power…

Managing third-party risks in complex IT environments

Key steps to protect your organization’s data from unauthorized external access Webinar  With increasing reliance on contractors, partners, and vendors, managing third-party access to systems and data is a complex security challenge.… This article has been indexed from The Register…

Winos4.0 abuses gaming apps to infect, control Windows machines

‘Multiple’ malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.… This article has been indexed from The Register…