Tag: The Register – Security

How to bridge the MFA gap

If a credential is worth protecting, it’s worth protecting well. Sponsored feature  What do flossing and multi-factor authentication (MFA) have in common? Each is highly beneficial, yet far too few people do them consistently. MFA helps protect organizations from credential-based…

Redefining identity security in the age of agentic AI

Now AI agents have identity, too. Here’s how to handle it Partner content  The rise of agentic AI systems is rewriting the rules of cybersecurity. Unlike generative AI, which relies on predefined instructions or prompts, AI agents operate autonomously, learn…

Scattered Spider has moved from retail to insurance

Google threat analysts warn the team behind the Marks & Spencer break-in has moved on Cyber-crime crew Scattered Spider has infected US insurance companies following a series of ransomware attacks against American and British retailers, according to Google, which urged…

How collaborative security can build you a better business

Getting employees on board can do more than prevent breaches; it can send profitability soaring Sponsored Post  Here’s a sobering reality: 95% of data breaches involve human error. So, why do most organizations still throw technology at a fundamentally human…

Cyber weapons in the Israel-Iran conflict may hit the US

With Tehran’s military weakened, digital retaliation likely, experts tell The Reg The current Israel–Iran military conflict is taking place in the era of hybrid war, where cyberattacks amplify and assist missiles and troops, and is being waged between two countries…

‘Major compromise’ at NHS temping arm exposed gaping security holes

Incident responders suggested sweeping improvements following Active Directory database heist Exclusive  Cybercriminals broke into systems belonging to the UK’s NHS Professionals body in May 2024, stealing its Active Directory database, but the healthcare organization never publicly disclosed it, The Register…

Hire me! To drop malware on your computer

FIN6 moves from point-of-sale compromise to phishing recruiters In a scam that flips the script on fake IT worker schemes, cybercriminals posing as job seekers on LinkedIn and Indeed are targeting recruiters – a group hated only slightly less than…

Asia dismantles 20,000 malicious domains in infostealer crackdown

Interpol coordinates operation, nabs 32 across Vietnam, Sri Lanka, and Nauru Thirty-two people across Asia have been arrested over their suspected involvement with infostealer malware in the latest international collaboration against global cybercrime.… This article has been indexed from The…

Analysis to action: Operationalizing your threat intelligence

Timing is everything in the war against ransomware thieves, says Prelude Security Partner content  When a new security advisory drops or an alarming new ransomware campaign makes the news, the question from leadership inevitably follows: “Are we covered?”… This article…

CISO who helped unmask Badbox warns: Version 3 is coming

The botnet’s still alive and evolving Badbox 2.0, the botnet that infected millions of smart TV boxes and connected devices before private security researchers and law enforcement partially disrupted its infrastructure, is readying for a third round of fraud and…

Critical Wazuh bug exploited in growing Mirai botnet infection

The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code execution bug was disclosed.……

Are technologists a threat to doing business securely?

Why an obsession with technology prevents us from reducing human-initiated cybersecurity breaches Partner content  Cybersecurity leaders are fighting an invisible war, not just with threat actors but within their own organizations. It’s a conflict I’ve spent a lot of time…

AT&T not sure if new customer data dump is déjà vu

Re-selling info from an earlier breach? Probably. But which one? AT&T is investigating claims that millions of its customers’ data are listed for sale on a cybercrime forum in what appears to be a re-release from an earlier hack.… This…

Ukraine strikes Russian bomber-maker with hack attack

Drones are not enough Following a daring drone attack on Russian airfields, Ukrainian military intelligence has reportedly also hacked the servers of Tupolev, the Kremlin’s strategic bomber maker.… This article has been indexed from The Register – Security Read the…

UK CyberEM Command to spearhead new era of armed conflict

Government details latest initiative following announcement last week Revealing more details about the Cyber and Electromagnetic (CyberEM) military domain, the UK’s Ministry of Defence (MoD) says “there are pockets of excellence” but improvements must be made to ensure the country’s…

Crooks fleece The North Face accounts with recycled logins

Outdoorsy brand blames credential stuffing Joining the long queue of retailers dealing with cyber mishaps is outdoorsy fashion brand The North Face, which says crooks broke into some customer accounts using login creds pinched from breaches elsewhere.… This article has…

Attack on LexisNexis Risk Solutions exposes data on 300k +

Data analytics and risk management biz says software dev platform breached, not itself LexisNexis Risk Solutions (LNRS) is the latest big-name organization to disclose a serious cyberattack leading to data theft, with the number of affected individuals pegged at 364,333.……