Security chief talks to El Reg as Feds urge everyone to use encrypted chat interview While Chinese-government-backed spies maintained access to US telecommunications providers’ networks for months – and in some cases still haven’t been booted out – T-Mobile US…
Category: The Register – Security
Cops arrest suspected admin of German-language crime bazaar
Drugs, botnets, forged docs, and more generated fortune for platform sellers German authorities say they have again shut down the perhaps unwisely named Crimenetwork platform and arrested a suspected admin.… This article has been indexed from The Register – Security…
Perfect 10 directory traversal vuln hits SailPoint’s IAM solution
20-year-old info disclosure class bug still pervades security software It’s time to rev up those patch engines after SailPoint disclosed a perfect 10/10 severity vulnerability in its identity and access management (IAM) platform IdentityIQ.… This article has been indexed from…
FTC scolds two data brokers for allegedly selling your location to the metre
‘Where we go is who we are’ totally isn’t a creepy ad slogan at all The FTC has reached a settlement with two data brokerages over allegations they harvested precise location data that shows when people entered hospitals, places of…
Eurocops take down ‘secure’ criminal chat system known as Matrix
They took the red pill Updated French and Dutch police have taken down the Matrix chat app, which was designed by criminals for criminals to be a secure encrypted messaging tool.… This article has been indexed from The Register –…
Microsoft says premature patch could make Windows Recall forget how to work
Installed the final non-security preview update of 2024? Best not hop onto the Dev Channel Microsoft has pinned down why some eager Windows Insiders could not persuade the Recall preview to save any snapshots. It’s all down to a pesky…
Major energy contractor reports ‘limited’ access to IT after ransomware locks files
ENGlobal customers include the Pentagon as well as major oil and gas producers American energy contractor ENGlobal disclosed that access to its IT systems remains limited following a ransomware infection in late November.… This article has been indexed from The…
Severity of the risk facing the UK is widely underestimated, NCSC annual review warns
National cyber emergencies increased threefold this year The number of security threats in the UK that hit the country’s National Cyber Security Centre’s (NCSC) maximum severity threshold has tripled compared to the previous 12 months.… This article has been indexed…
Russia gives life sentence to Hydra dark web kingpin after seizing a ton of drugs
No exaggeration – literally a ton. Plus, 15 co-conspirators also put behind bars A Russian court has handed a life sentence to the head of the infamous online drugs souk Hydra, and 15 of his co-conspirators will also spend many…
Data on 760K workers from Xerox, Nokia, BofA, Morgan Stanley and more dumped online
Yet another result of the MOVEit mess Hundreds of thousands of employees from major corporations including Xerox, Nokia, Koch, Bank of America, Morgan Stanley and others appear to be the latest victims in a massive data breach linked to last…
AWS unveils cloud security IR service for a mere $7K a month
Tap into the infinite scalability… of pricing Re:Invent Amazon Web Services has a new incident response service that combines automation and people to protect customers’ AWS accounts – at a hefty price.… This article has been indexed from The Register…
Discover the future of Linux security
Explore open source strategies to safeguard critical systems and data Webinar Linux security is a component that sits at the heart of today’s IT landscape.… This article has been indexed from The Register – Security Read the original article: Discover…
Russia arrests one of its own – a cybercrime suspect on FBI’s most wanted list
The latest in an unusual change of fortune for group once protected by the Kremlin An alleged former affiliate of the LockBit and Babuk ransomware operations, who also just happens to be one of the most wanted cybercriminals in the…
Telco security is a dumpster fire and everyone’s getting burned
The politics of cybersecurity are too important to be left to the politicians Opinion Here’s a front-page headline you won’t see these days: CHINA’S SPIES ARE TAPPING OUR PHONES. Not that they’re not – they are – but, like the…
Interpol nabs thousands, seizes millions in global cybercrime-busting op
Also, script kiddies still a threat, Tornado Cash is back, UK firms lose billions to avoidable attacks, and more Infosec in brief Interpol and its financial supporters in the South Korean government are back with another round of anti-cybercrime arrests…
RansomHub claims to net data hat-trick against Bologna FC
Crooks say they have stolen sensitive files on managers and players Italian professional football club Bologna FC is allegedly a recent victim of the RansomHub cybercrime gang, according to the group’s dark web postings.… This article has been indexed from…
Zabbix urges upgrades after critical SQL injection bug disclosure
US agencies blasted ‘unforgivable’ SQLi flaws earlier this year Open-source enterprise network and application monitoring provider Zabbix is warning customers of a new critical vulnerability that could lead to full system compromise.… This article has been indexed from The Register…
Ransom gang claims attack on NHS Alder Hey Children’s Hospital
Second alleged intrusion on English NHS org systems this week Yet another of the UK’s National Health Service (NHS) systems appears to be under attack, with a ransomware gang threatening to leak stolen data it says is from one of…
Fighting cybercrime with actionable knowledge
A reason to celebrate SANS and its 35 years of cyber security training Sponsored Post Cybercrime never sleeps. As threats continue to evolve and attack surfaces become broader and harder to defend, it has never been more important for the…
NHS major ‘cyber incident’ forces hospitals to use pen and paper
Systems are isolated and pulled offline, while scheduled procedures are canceled The ongoing cybersecurity incident affecting a North West England NHS group has forced sites to fall back on pen-and-paper operations, according to a statement.… This article has been indexed…
The only thing worse than being fired is scammers fooling you into thinking you’re fired
Scumbags play on victims’ worst fears in phishing campaign referencing UK Employment Tribunal A current phishing campaign scares recipients into believing they’ve been sacked, when in reality they’ve been hacked – and infected with infostealers and other malware that means…
Salt Typhoon’s surge extends far beyond US telcos
Plus, a brand-new backdoor, GhostSpider, is linked to the cyber-spy crew’s operations The reach of the China-linked Salt Typhoon gang extends beyond American telecommunications giants, and its arsenal includes several backdoors, including a brand-new malware dubbed GhostSpider, according to Trend…
T-Mobile US takes a victory lap after stopping cyberattacks: ‘Other providers may be seeing different outcomes’
Funny what putting more effort and resources into IT security can do Attackers – possibly China’s Salt Typhoon cyber-espionage crew – compromised an unnamed wireline provider’s network and used this access to try to break into T-Mobile US systems multiple…
Bolster resilience against 2025 cyber threats
Watch this webinar to learn why cybersecurity leaders can trust the MITRE ATT&CK Evaluations Partner Content In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect…
Data broker leaves 600K+ sensitive files exposed online
Researcher spotted open database before criminals … we hope Exclusive More than 600,000 sensitive files containing thousands of people’s criminal histories, background checks, vehicle and property records were exposed to the internet in a non-password protected database belonging to data…
First-ever UEFI bootkit for Linux in the works, experts say
Bootkitty doesn’t bite… yet Security researchers say they’ve stumbled upon the first-ever UEFI bootkit targeting Linux, illustrating a key moment in the evolution of such tools.… This article has been indexed from The Register – Security Read the original article:…
Automating endpoint management
Addressing the challenges of patching and vulnerability remediation Webinar Managing endpoints efficiently has perhaps never been more important or more complex. … This article has been indexed from The Register – Security Read the original article: Automating endpoint management
The workplace has become a surveillance state
Cracked Labs report explores the use of motion sensors and wireless networking kit to monitor offices Office buildings have become like web browsers – they’re full of tracking technology, a trend documented in a report out this week by Cracked…
CrowdStrike still doesn’t know how much its Falcon flame-out will cost
Thinks customers may have forgiven it after revenue hits a record CrowdStrike can’t yet confidently predict the financial impact of the failed update to its Falcon software that crashed millions of computers around the world last July, but is confident…
Telco engineer who spied on US employer for Beijing gets four years in the clink
Provides insight to how China gets inside US systems, perhaps at Verizon and Infosys A 59 year-old Florida telco engineer was sentenced to 48 months in prison after he served as a spy for China and provided Beijing with details…
Man accused of hilariously bad opsec as alleged cybercrime spree detailed
Complaint claims he trespassed, gave himself discounts, and sorted CCTV access… A Kansas City man who stands accused of having a disregard for basic opsec made his first court appearance on Friday over a series of alleged cybercrimes.… This article…
US senators propose law to require bare minimum security standards
In case anyone forgot about Change Healthcare American hospitals and healthcare organizations would be required to adopt multi-factor authentication (MFA) and other minimum cybersecurity standards under new legislation proposed by a bipartisan group of US senators. … This article has been…
Fortify your data
How cyber resilient storage hardware can defeat ransomware Sponsored Feature Ransomware is everywhere. The FBI and CISA just issued yet another advisory about it.… This article has been indexed from The Register – Security Read the original article: Fortify your…
Bing Wallpaper app, now in Windows Store, accused of cookie shenanigans
Microsoft free tool snooping on users? Surely not! If you’ve been tempted to download the Bing Wallpaper app to spice up your Windows 11 desktop backgrounds, you may want to think twice.… This article has been indexed from The Register…
Another ‘major cyber incident’ at a UK hospital, outpatients asked to stay away
Third time this year an NHS unit’s IT systems have come under attack A UK hospital is declaring a “major incident,” cancelling all outpatient appointments due to “cybersecurity reasons.”… This article has been indexed from The Register – Security Read…
QNAP and Veritas dump 30-plus vulns over the weekend
Just what you want to find when you start a new week Taiwanese NAS maker QNAP addressed 24 vulnerabilities across various products over the weekend.… This article has been indexed from The Register – Security Read the original article: QNAP…
Britain Putin up stronger AI defences to counter growing cyber threats
‘Be in no doubt: the UK and others in this room are watching Russia’ The government of the United Kingdom on Monday announced the formation of a Laboratory for AI Security Research (LASR) to make the nation more resilient to…
Supply chain management vendor Blue Yonder succumbs to ransomware
And it looks like major UK retailers that rely on it are feeling the pinch US-based supply chain SaaS vendor Blue Yonder has revealed a service disruption caused by ransomware, and its customers are reportedly struggling to get goods onto…
Security? We’ve heard of it: How Microsoft plans to better defend Windows
Did we say CrowdStrike? We meant, er, The July Incident… IGNITE The sound of cyber security professionals spraying their screens with coffee could be heard this week as Microsoft claimed, “security is our top priority,” as it talked up its…
China has utterly pwned ‘thousands and thousands’ of devices at US telcos
Senate Intelligence Committee chair says his ‘hair is on fire’ as execs front the White House The Biden administration on Friday hosted telco execs to chat about China’s recent attacks on the sector, amid revelations that US networks may need…
Google blocked 1,000-plus pro-China fake news websites from its search results
Beijing’s propaganda buddies aren’t just using social media Google’s Threat Intelligence Group has blocked a network China-related firms from its search results for operating fake news services and websites.… This article has been indexed from The Register – Security Read…
Imagine a land in which Big Tech can’t send you down online rabbit holes or use algorithms to overcharge you
China is trying to become that land, with a government crackdown on the things that make the internet no fun Internet echo chambers and nasty e-commerce tricks that analyze your behavior to milk you for more cash are set to…
Russian spies may have moved in next door to target your network
Plus: Microsoft seizes phishing domains; Helldown finds new targets; Illegal streaming with Jupyter, and more Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve as a launching point for Russian…
Volunteer DEF CON hackers dive into America’s leaky water infrastructure
Six sites targeted for security clean-up, just 49,994 to go A plan for hackers to help secure America’s critical infrastructure has kicked off with six US water companies signing up to let coders kick the tires of their computer systems…
Trump taps border hawk to head DHS. Will Noem’s ‘enthusiasm’ extend to digital domain?
Meanwhile, CISA chief Jen Easterly will step down prior to inauguration Analysis President-elect Donald Trump has announced several unorthodox nominations for his cabinet over the last two weeks, including South Dakota Governor Kristi Noem, whom he tapped to serve as…
Andrew Tate’s site ransacked, subscriber data stolen
He’ll just have to take this one on the chin The website of self-proclaimed misogynist and alleged sex trafficker and rapist Andrew Tate has been compromised and data on its paying subscribers stolen.… This article has been indexed from The…
1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole
PAN-PAN! Intruders inject web shell backdoors, crypto-coin miners, more Thousands of Palo Alto Networks firewalls were compromised by attackers exploiting two recently patched security bugs. The intruders were able to deploy web-accessible backdoors to remotely control the equipment as well…
How to master endpoint security
Get some advice from this discussion with a Kaseya expert Webinar Want to access the key takeaways from the recent “Secure Everything for Every Endpoint” webinar?… This article has been indexed from The Register – Security Read the original article:…
SafePay ransomware gang claims Microlise attack that disrupted prison van tracking
Fledgling band of crooks says it stole 1.2 TB of data The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its extortion demands before…
Helpline for Yakuza victims fears it leaked their personal info
Organized crime types tend not to be kind to those who go against them, so this is nasty A local Japanese government agency dedicated to preventing organized crime has apologized after experiencing an incident it fears may have led to…
Here’s what happens if you don’t layer network security – or remove unused web shells
TL;DR: Attackers will break in and pwn you, as a US government red team demonstrated The US Cybersecurity and Infrastructure Agency often breaks into critical organizations’ networks – with their permission, of course – to simulate real-world cyber attacks and…
Put your usernames and passwords in your will, advises Japan’s government
Digital end of life planning saves your loved ones from a little extra anguish Japan’s National Consumer Affairs Center on Wednesday suggested citizens start “digital end of life planning” and offered tips on how to do it.… This article has…
Now Online Safety Act is law, UK has ‘priorities’ – but still won’t explain ‘spy clause’
Draft doc struggles to describe how theoretically encryption-busting powers might be used The UK government has set out plans detailing how it will use the new law it has created to control online platforms and social media – with one…
‘Alarming’ security bugs lay low in Linux’s needrestart server utility for 10 years
Update now: Qualys says flaws give root to local users, are ‘easily exploitable’ Researchers at Qualys refuse to release exploit code for five bugs in the Linux world’s needrestart utility that allow unprivileged local attackers to gain root access without…
Chinese ship casts shadow over Baltic subsea cable snipfest
Danish military confirms it is monitoring as Swedish police investigate. Cloudflare says impact was ‘minimal’ The Danish military has confirmed it is tracking a Chinese ship that is under investigation after two optical fiber internet cables under the Baltic Sea…
DARPA-backed voting system for soldiers abroad savaged
VotingWorks, developer of the system, disputes critics’ claims An electronic voting project backed by DARPA – Uncle Sam’s boffinry nerve center – to improve the process of absentee voting for American military personnel stationed abroad has been slammed by security…
Join in the festive cybersecurity fun
Get hands-on cybersecurity training this seasonal challenge Sponsored Post Are you ready to pit your wits against the cyber exercises featured in the Holiday Hack Challenge 2024: Snow-maggedon?… This article has been indexed from The Register – Security Read the…
iOS 18 added secret and smart security feature that reboots iThings after three days
Security researcher’s reverse engineering effort reveals undocumented reboot timer that will make life harder for attackers Apple’s latest mobile operating system, iOS 18, appears to have added an undocumented security feature that reboots devices if they’re not used for 72…
Ford ‘actively investigating’ after employee data allegedly parked on leak site
Plus: Maxar Space Systems confirms employee info stolen in digital intrusion Ford Motor Company says it is looking into allegations of a data breach after attackers claimed to have stolen an internal database containing 44,000 customer records and dumped the…
Critical 9.8-rated VMware vCenter RCE bug exploited after patch fumble
If you didn’t fix this a month ago, your to-do list probably needs a reshuffle Two VMware vCenter server bugs, including a critical heap-overflow vulnerability that leads to remote code execution (RCE), have been exploited in attacks after Broadcom’s first…
T-Mobile US ‘monitoring’ China’s ‘industry-wide attack’ amid fresh security breach fears
Un-carrier said to be among those hit by Salt Typhoon, including AT&T, Verizon T-Mobile US said it is “monitoring” an “industry-wide” cyber-espionage campaign against American networks – amid fears Chinese government-backed spies compromised the un-carrier among with various other telecommunications…
Sweden’s ‘Doomsday Prep for Dummies’ guide hits mailboxes today
First in six years is nearly three times the size of the older, pre-NATO version Residents of Sweden are to receive a handy new guide this week that details how to prepare for various types of crisis situations or wartime…
Deepen your knowledge of Linux security
Event The security landscape is constantly shifting. If you’re running Linux, staying ahead may rely on understanding the challenges – and opportunities – unique to Linux environments.… This article has been indexed from The Register – Security Read the original…
Teen serial swatter-for-hire busted, pleads guilty, could face 20 years
PLUS: Cost of Halliburton hack disclosed; Time to dump old D-Link NAS; More UN cybercrime convention concerns; and more Infosec in brief A teenager has pleaded guilty to calling in more than 375 fake threats to law enforcement, and now…
Will passkeys ever replace passwords? Can they?
Here’s why they really should Systems Approach I have been playing around with passkeys, or as they are formally known, discoverable credentials.… This article has been indexed from The Register – Security Read the original article: Will passkeys ever replace…
Rust haters, unite! Fil-C aims to Make C Great Again
It’s memory-safe, with a few caveats Developers looking to continue working in the C and C++ programming languages amid the global push to promote memory-safe programming now have another option that doesn’t involve learning Rust.… This article has been indexed…
Swiss cheesed off as postal service used to spread malware
QR codes arrive via an age-old delivery system Switzerland’s National Cyber Security Centre (NCSC) has issued an alert about malware being spread via the country’s postal service.… This article has been indexed from The Register – Security Read the original…
Bloke behind Helix Bitcoin launderette jailed for three years, hands over $400M
Digital money laundering pays, until it doesn’t An Ohio man, who operated the Grams dark-web search engine and the Helix cryptocurrency money-laundering service associated with it, has been sentenced to three years in prison.… This article has been indexed from…
Letting chatbots run robots ends as badly as you’d expect
LLM-controlled droids easily jailbroken to perform mayhem, researchers warn Science fiction author Isaac Asimov proposed three laws of robotics, and you’d never know it from the behavior of today’s robots or those making them.… This article has been indexed from…
Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit
Yank access to management interface, stat A critical zero-day vulnerability in Palo Alto Networks’ firewall management interface that can allow an unauthenticated attacker to remotely execute code is now officially under active exploitation.… This article has been indexed from The…
Keyboard robbers steal 171K customers’ data from AnnieMac mortgage house
Names and social security numbers of folks looking for the biggest loan of their lives exposed A major US mortgage lender has told customers looking to make the biggest financial transaction of their lives that an intruder broke into its…
Keyboard robbers steal 171k customers’ data from AnnieMac mortgage house
Names and social security numbers of folks looking for the biggest loan of their lives exposed A major US mortgage lender has told customers looking to make the biggest financial transaction of their lives that an intruder broke into its…
Simplifying endpoint security
Discover unified strategies to secure and manage all endpoints across your organization Webinar As organizations expand their digital footprint, the range of endpoints – spanning from laptops to IoT devices – continues to grow.… This article has been indexed from…
Bitfinex burglar bags 5 years behind bars for Bitcoin heist
A nervous wait for rapper wife who also faces a stint in the clink The US is sending the main figure behind the 2016 intrusion at crypto exchange Bitfinex to prison for five years after he stole close to 120,000…
Microsoft Power Pages misconfigurations exposing sensitive data
NHS supplier that leaked employee info fell victim to fiddly access controls that can leave databases dangling online Private businesses and public-sector organizations are unwittingly exposing millions of people’s sensitive information to the public internet because they misconfigure Microsoft’s Power…
Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost
Plus a bonus hard-coded local API key A now-patched, high-severity bug in Fortinet’s FortiClient VPN application potentially allows a low-privilege rogue user or malware on a vulnerable Windows system to gain higher privileges from another user, execute code and possibly…
Cybercriminal devoid of boundaries gets 10-year prison sentence
Serial extortionist of medical facilities stooped to cavernous lows in search of small payouts A rampant cybercrook and repeat attacker of medical facilities in the US is being sentenced to a decade in prison, around seven years after the first…
Kids’ shoemaker Start-Rite trips over security again, spilling customer card info
Full details exposed, putting shoppers at serious risk of fraud Children’s shoemaker Start-Rite is dealing with a nasty “security incident” involving customer payment card details, its second significant lapse during the past eight years.… This article has been indexed from…
NatWest blocks bevy of apps in clampdown on unmonitorable comms
From guidance to firm action… no more WhatsApp, Meta’s Messenger, Signal, Telegram and more The full list of messaging apps officially blocked by Brit banking and insurance giant NatWest Group is more extensive than WhatsApp, Meta’s Messenger, and Skype –…
Asda security chief replaced, retailer sheds jobs during Walmart tech divorce
British grocer’s workers called back to office as clock ticks for contractors The head of tech security at Asda, the UK’s third-largest food retailer, has left amid an ongoing tech divorce from US grocery giant Walmart.… This article has been…
Five Eyes infosec agencies list 2024’s most exploited software flaws
Slack patching remains a problem – which is worrying as crooks increasingly target zero-day vulns The cyber security agencies of the UK, US, Canada, Australia, and New Zealand have issued their annual list of the 15 most exploited vulnerabilities, and…
Reminder: China-backed crews compromised ‘multiple’ US telcos in ‘significant cyber espionage campaign’
Feds don’t name Salt Typhoon, but describe Beijing band’s alleged deeds The US government has confirmed there was “a broad and significant cyber espionage campaign” conducted by China-linked snoops against “multiple” American telecommunications providers’ networks.… This article has been indexed…
China-backed crews compromised ‘multiple’ US telcos in ‘significant cyber espionage campaign’
Feds don’t name Salt Typhoon, but describe Beijing band’s alleged deeds The US government has detected “a broad and significant cyber espionage campaign” conducted by China-linked attackers and directed at “multiple” US telecommunications providers’ networks.… This article has been indexed…
ShrinkLocker ransomware scrambled your files? Free decryption tool to the rescue
Plus: CISA’s ScubaGear dives deep to fix M365 misconfigs Bitdefender has released a free decryption tool that can unlock data encrypted by the ShrinkLocker ransomware.… This article has been indexed from The Register – Security Read the original article: ShrinkLocker…
Data broker amasses 100M+ records on people – then someone snatches, sells it
We call this lead degeneration What’s claimed to be more than 183 million records of people’s contact details and employment info has been stolen or otherwise obtained from a data broker and put up for sale by a miscreant.… This…
Ransomware fiends boast they’ve stolen 1.4TB from US pharmacy network
American Associated Pharmacies yet to officially confirm infection American Associated Pharmacies (AAP) is the latest US healthcare organization to have had its data stolen and encrypted by cyber-crooks, it is feared.… This article has been indexed from The Register –…
Microsoft slips Task Manager and processor count fixes into Patch Tuesday
Sore about cores no more Microsoft has resolved two issues vexing Windows 11 24H2 and Windows Server 2025 users among the many security updates that emerged on Patch Tuesday.… This article has been indexed from The Register – Security Read…
China’s Volt Typhoon crew and its botnet surge back with a vengeance
Ohm, for flux sake China’s Volt Typhoon crew and its botnet are back, compromising old Cisco routers once again to break into critical infrastructure networks and kick off cyberattacks, according to security researchers.… This article has been indexed from The…
Admins can give thanks this November for dollops of Microsoft patches
Don’t be a turkey – get these fixed Patch Tuesday Patch Tuesday has swung around again, and Microsoft has released fixes for 89 CVE-listed security flaws in its products – including two under active attack – and reissued three more.……
Air National Guardsman gets 15 years after splashing classified docs on Discord
Jack Teixeira, 22, talked of ‘culling the weak minded’ – hmm! A former Air National Guard member who stole classified American military secrets, and showed them to his gaming buddies on Discord, has been sentenced to 15 years in prison.……
Here’s what we know about the suspected Snowflake data extortionists
A Canadian and an American living in Turkey ‘walk into’ cloud storage environments… Two men allegedly compromised what’s believed to be multiple organizations’ Snowflake-hosted cloud environments, stole sensitive data within, and extorted at least $2.5 million from at least three…
‘Cybersecurity issue’ at Food Lion parent blamed for US grocery mayhem
Stores still open, but customers report delayed deliveries, invoicing issues, and more at Stop & Shop and others Retail giant Ahold Delhaize, which owns Food Lion and Stop & Shop, among others, is confirming outages at several of its US…
HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code
‘Once again, we’ve lost a little more faith in the internet,’ researcher says Researchers are publicizing a proof of concept (PoC) exploit for what they’re calling an unauthenticated remote code execution (RCE) vulnerability in Citrix’s Virtual Apps and Desktops.… This…
Managing third-party risks in complex IT environments
Key steps to protect your organization’s data from unauthorized external access Webinar With increasing reliance on contractors, partners, and vendors, managing third-party access to systems and data is a complex security challenge.… This article has been indexed from The Register…
Amazon confirms employee data exposed in leak linked to MOVEit vulnerability
Over 5 million records from 25 organizations posted to black hat forum Amazon employees’ data is part of a stolen trove posted to a cybercrime forum linked to last year’s MOVEit vulnerability.… This article has been indexed from The Register…
FBI issues warning as crooks ramp up emergency data request scams
Just because it’s .gov doesn’t mean that email is trustworthy Cybercrooks abusing emergency data requests in the US isn’t new, but the FBI says it’s becoming a more pronounced issue as the year draws to a close.… This article has…
Dark web crypto laundering kingpin sentenced to 12.5 years in prison
Prosecutors hand Russo-Swede a half-billion bill The operator of the longest-running money laundering machine in dark web history, Bitcoin Fog, has been sentenced to 12 years and six months in US prison.… This article has been indexed from The Register…
Alleged Snowflake attacker gets busted by Canadians – politely, we assume
Also: Crypto hacks will continue; CoD hacker gets thousands banned, and more in brief One of the suspected masterminds behind the widespread Snowflake breach has been arrested in Canada – but the saga isn’t over, eh. … This article has been…
Scattered Spider, BlackCat claw their way back from criminal underground
We all know by now that monsters never die, right? Two high-profile criminal gangs, Scattered Spider and BlackCat/ALPHV, seemed to disappear into the darkness like their namesakes following a series of splashy digital heists last year, after which there were…
Winos4.0 abuses gaming apps to infect, control Windows machines
‘Multiple’ malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.… This article has been indexed from The Register…