What?! No complimentary credit monitoring? The Canadian outpost of retailer Toys R Us on Thursday notified customers that attackers accessed a database, stole some of their personal information, then posted the data online.… This article has been indexed from The…
Tag: The Register – Security
Trump’s workforce cuts blamed as America’s cyber edge dulls
The Cyberspace Solarium Commission says years of progress are being undone amid current administration’s cuts America’s once-ambitious cyber defences are starting to rust, according to the latest annual report from the US Cyberspace Solarium Commission (CSC), which warns that policy…
Google nukes 3,000 YouTube videos that sowed malware disguised as cracked software
Check Point helps exorcise vast ‘Ghost Network’ that used fake tutorials to push infostealers Google has taken down thousands of YouTube videos that were quietly spreading password-stealing malware disguised as cracked software and game cheats.… This article has been indexed…
SpaceX pulls plug on 2,500 Starlink terminals tied to Myanmar fraud farms
Criminal outfits had been using Musk’s broadband beacons to run cyber-slavery scams across Southeast Asia SpaceX says it has shut down thousands of Starlink terminals that were powering Myanmar’s notorious scam compounds after its satellite network was found to be…
This free IGA tool boosts your identity security
Here are five ways tenfold’s free IGA solution helps you streamline identity governance and access control. Partner Content In a world where one wrong click can set off a catastrophic breach, organizations must control what their users have access to…
Forking confusing: Vulnerable Rust crate exposes uv Python packager
Forks of forks of forks, but which ones are patched? A vulnerability in the popular Rust crate async-tar has affected the fast uv Python package manager, which uses a forked version that’s now patched – but the most widely downloaded…
Jaguar Land Rover cyber-meltdown tipped to cost the UK almost £2B
That’s a lot of extended warranties The Jaguar Land Rover (JLR) cyberattack could end up being the costliest such incident in UK history, billed at an estimated £1.9 billion and affecting over 5,000 organizations.… This article has been indexed from…
UK data regulator defends decision not to investigate MoD Afghan data breach
ICO says probe unnecessary after reviewing ministry’s handling of leak The UK’s data protection regulator declined to launch an investigation into a leak at the Ministry of Defence that risked the lives of thousands of Afghans connected with the British…
Restructuring risk operations: building a business-aligned cyber strategy
Why organizations need a new strategy to break down silos and usher in a new era of risk intelligence Partner Content As cyber risk continues to escalate, many organizations face a disconnect between cybersecurity investments and actual risk reduction. Despite…
Muji’s minimalist calm shattered as ransomware takes down logistics partner
Japanese retailer halts online orders after attack cripples third-party vendor Japanese retailer Muji is suspending online orders after logistics partner Askul was knocked offline by a ransomware attack.… This article has been indexed from The Register – Security Read the…
Feds flag active exploitation of patched Windows SMB vuln
CISA adds high-severity flaw to KEV list, urges swift updating Uncle Sam’s cyber wardens have warned that a high-severity flaw in Microsoft’s Windows SMB client is now being actively exploited – months after it was patched.… This article has been…
A shot in the dark: Can malware vaccines stop ransomware’s rampage?
Security pros explore whether infection-spoofing code can immunize Windows systems against attack Feature What’s better, prevention or cure? For a long time the global cybersecurity industry has operated by reacting to attacks and computer viruses. But given that ransomware has…
Zero Trust Everywhere: a new era in cybersecurity for European organizations
Zero trust is the best kind of trust when it comes to securing your organization, says ZScaler Partner Content Many organizations across Europe have taken steps to implement Zero Trust principles, securing users, devices, workloads, and applications. But while these…
Anti-fraud body leaks dozens of email addresses in invite mishap
Calendar cock-up exposed recipients’ details Anti-fraud nonprofit Cifas was left red-faced after sending out a calendar invite that exposed the email addresses of dozens of individuals working across the fraud space.… This article has been indexed from The Register –…
UK calls up Armed Forces veterans for digital ID soft launch
Once more into the, er, breach? The UK’s Armed Forces veterans are being tasked with one last mission – proving the government can successfully roll out a digital ID card scheme.… This article has been indexed from The Register –…
Have I Been Pwned logs 17.6M victims in Prosper breach
P2P lending platform says it could not verify the claims at present Data breach tracker HaveIBeenPwned claims the victim count of peer-to-peer lender Prosper’s September cyberattack stands at 17.6 million.… This article has been indexed from The Register – Security…
Labor unions sue Trump administration over social media surveillance
Sharing views POTUS doesn’t like? Say goodbye to that visa, First Amendment be damned Lawyers at the Electronic Frontier Foundation (EFF) are helping three US labor unions sue the Trump administration over a social media surveillance program that threatens to…
Carmakers fear chip crunch as Dutch sanctions hit Nexperia
Beijing blocks exports after Netherlands imposes special measures on Chinese-owned chipmaker Major car, van, truck and bus manufacturers are warning that the Dutch government placing semiconductor biz Nexperia under special administrative measures could result in a shortage of automotive chips.……
Vulnerability scores, huh, what are they good for? Almost nothing
CVE and CVSS systems suffer from misaligned incentives and inconsistency Aram Hovespyan, co-founder and CEO of security biz Codific, says that the rating systems for identifying security vulnerabilities and assessing threat risk need to be overhauled.… This article has been…
Chinese cyberspies snoop on Russian IT biz in rare east-on-east attack
Who needs enemies when you have friends like Xi? China’s cyberspies quietly broke into a Russian IT service provider in what researchers say is a rare example of Beijing turning its digital gaze on Moscow.… This article has been indexed…