Is that a walrus in your server logs, or aren’t you pleased to see me? Opinion At the start of September, Transport for London was hit by a major cyber attack. TfL is the public body that moves many of…
Tag: The Register – Security
6 IT contractors arrested for defrauding Uncle Sam out of millions
Also, ecommerce fraud ring disrupted, another Operation Power Off victory, Sino SOHO botnet spotted, and more in brief The US Department of Justice has charged six people with two separate schemes to defraud Uncle Sam out of millions of dollars…
Financial institutions told to get their house in order before the next CrowdStrike strikes
Calls for improvements will soon turn into demands when new rules come into force The UK’s finance regulator is urging all institutions under its remit to better prepare for IT meltdowns like that of CrowdStrike in July.… This article has…
UK councils bat away DDoS barrage from pro-Russia keyboard warriors
Local authority websites downed in response to renewed support for Ukraine Multiple UK councils had their websites either knocked offline or were inaccessible to residents this week after pro-Russia cyber nuisances added them to a daily target list.… This article…
Hack Nintendo’s alarm clock to show cat pics? Let’s-a-go!
How ‘Gary’ defeated Bowser broke into the interactive alarm clock A hacker who uses the handle GaryOderNichts has found a way to break into Nintendo’s recently launched Alarmo clock, and run code on the device.… This article has been indexed…
Gang gobbles 15K credentials from cloud and email providers’ garbage Git configs
Emeraldwhale gang looked sharp – until it made a common S3 bucket mistake A criminal operation dubbed Emeraldwhale has been discovered after it dumped more than 15,000 credentials belonging to cloud service and email providers in an open AWS S3…
LottieFiles supply chain attack exposes users to malicious crypto wallet drainer
A scary few Halloween hours for team behind hugely popular web plugin LottieFiles is overcoming something of a Halloween fright after battling to regain control of a compromised developer account that was used to exploit users’ crypto wallets.… This article…
Tower PC case used as ‘creative cavity’ by drug importer
Motherboard missing, leaving space for a million hits of meth Australian police have arrested a man after finding he imported what appear to be tower PC cases that were full of illicit drugs.… This article has been indexed from The…
Chinese attackers accessed Canadian government networks – for five years
India makes it onto list of likely threats for the first time A report by Canada’s Communications Security Establishment (CSE) revealed that state-backed actors have collected valuable information from government networks for five years.… This article has been indexed from…
Windows Themes zero-day bug exposes users to NTLM credential theft
Plus a free micropatch until Redmond fixes the flaw There’s a Windows Themes spoofing zero-day bug on the loose that allows attackers to steal people’s NTLM credentials.… This article has been indexed from The Register – Security Read the original…
Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info
If you’re gonna come at the mouse, you need to be better at hiding your tracks A disgruntled ex-Disney employee has been arrested and charged with hacking his former employer’s systems to alter restaurant menus with potentially deadly consequences. … This…
Fired Disney staffer accused of hacking menu to add profanity, wingdings, while removing allergen info
If you’re gonna come at the mouse, you need to be better at hiding your tracks A disgruntled ex-Disney employee has been arrested and charged with hacking his former employer’s systems to alter restaurant menus with potentially deadly consequences. … This…
Russian spies use remote desktop protocol files in unusual mass phishing drive
The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel Microsoft says a mass phishing campaign by Russia’s foreign intelligence services (SVR) is now in its second week, and the spies are using a novel…
Beijing claims it’s found ‘underwater lighthouses’ that its foes use for espionage
Release the Kraken! China has accused unnamed foreign entities of using devices hidden in the seabed and bobbing on the waves to learn its maritime secrets.… This article has been indexed from The Register – Security Read the original article:…
Uncle Sam outs a Russian accused of developing Redline infostealing malware
Or: why using the same iCloud account for malware development and gaming is a bad idea The US government has named and charged a Russian national, Maxim Rudometov, with allegedly developing and administering the notorious Redline infostealer. … This article has…
Cast a hex on ChatGPT to trick the AI into writing exploit code
‘It was like watching a robot going rogue’ says researcher OpenAI’s language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which allows an attacker to jump the model’s built-in security guardrails and…
How to jailbreak ChatGPT and trick the AI into writing exploit code using hex encoding
‘It was like watching a robot going rogue’ says researcher OpenAI’s language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which allows an attacker to jump the model’s built-in security guardrails and…
Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting
US also charges an alleged Redline dev, no mention of an arrest International law enforcement officials have arrested two individuals and charged another in connection with the use and distribution of the Redline and Meta infostealer malware strains.… This article…
The story behind the Health Infrastructure Security and Accountability Act
Health care breaches lead to legislation Partner Content Breaches breed regulation; which hopefully in turn breeds meaningful change.… This article has been indexed from The Register – Security Read the original article: The story behind the Health Infrastructure Security and…
Admins better Spring into action over latest critical open source vuln
Patch up: The Spring framework dominates the Java ecosystem If you’re running an application built using the Spring development framework, now is a good time to check it’s fully updated – a new, critical-severity vulnerability has just been disclosed.… This…