WeRedEvils alleges successful attack on infrastructure, including data theft Israel-based hacktivists are taking credit for an ongoing internet outage in Iran.… This article has been indexed from The Register – Security Read the original article: Israeli hacktivist group brags it…
Tag: The Register – Security
Respect your data, and protect it
Hear how AI runtime security secures applications in the complete journey from design to build to run Sponsored Post Ensuring access to mission critical, AI-enabled applications is important for modern businesses keen on boosting employee productivity and transforming customer operations.…
Fortune 50 biz coughed up record-breaking $75M ransom to halt leak of stolen data
They say crime doesn’t pay. They’re right – it’s the victims doing the paying An unnamed Fortune 50 corporation paid a stonking $75 million to a ransomware gang to stop it leaking terabytes of stolen data.… This article has been…
UK plans to revamp national cyber defense tools are already in motion
Work aims to build on the success of NCSC’s 2016 initiative – and private sector will play a part The UK’s National Cyber Security Centre (NCSC) says it’s in the planning stages of bringing a new suite of services to…
UK crimebusters shut down global call-spoofing outfit that claimed 170K-plus victims
Suspected devs behind Russian Coms cuffed – now to find the users of the nastyware The UK’s National Crime Agency (NCA) has shut down an outfit called Russian Coms – a call-spoofing service believed to have swindled hundreds of thousands…
Japan mandates app to ensure national ID cards aren’t forged
First delays, then data leaks – now fraud detection needed at point of use The Japanese government has released details of of an app that verifies the legitimacy of its troubled My Number Card – a national identity document.… This…
India contemplates compulsory dynamic 2FA for digital payments
SMS OTPs are overused, so bring on the tokens and biometrics India’s central bank on Wednesday proposed a requirement for dynamically generated second authentication factors for most digital payments.… This article has been indexed from The Register – Security Read…
US sends cybercriminals back to Russia in prisoner swap that freed WSJ journo, others
Techno-crooks greeted by grinning Putin after landing At least two Russian cybercriminals are among those being returned to their motherland as part of a multinational prisoner exchange deal announced Thursday.… This article has been indexed from The Register – Security…
Too late now for canary updates, says pension fund suing CrowdStrike
That horse has not just bolted, it’s trampled all over kernel space CrowdStrike, after suggesting canary testing as a way to ensure it avoids future blunders leading to global computer outages, has been sued in federal court by investors for…
How to counter adversarial AI
Using Precision AI to stop cyber threats in real time Sponsored Hackers and cyber criminals are busy finding new ways of using AI to launch attacks on businesses and organisations often unprepared to deal with the speed, scale and sophistication…
FBI, CISA remind US voters that DDoS attacks can’t touch election systems
PSA comes amid multiple IT services crises in recent days US law enforcement and cybersecurity agencies are reminding the public that the country’s voting systems will remain unaffected by distributed denial of service (DDoS) attacks as the next presidential election…
Mozilla follows Google in losing trust in Entrust’s TLS certificates
Compliance failures and unsatisfactory responses mount from the long-time certificate authority Mozilla is following in Google Chrome’s footsteps in officially distrusting Entrust as a root certificate authority (CA) following what it says was a protracted period of compliance failures.… This…
Germany names China as source of attack on government geospatial agency
Meanwhile, US apparently considers further AI hardware sanctions Germany’s government has named China-controlled actors as the perpetrators of a 2021 cyber attack on the Federal Office of Cartography and Geodesy (BKG) – the official mapping agency.… This article has been…
Ransomware infection cuts off blood supply to 250+ hospitals
Scumbags go for the jugular A ransomware attack against blood-donation nonprofit OneBlood, which services more than 250 American hospitals, has “significantly reduced” the org’s ability to take, test, and distribute blood.… This article has been indexed from The Register –…
Ransomware infection cuts off blood supply to 250 hospitals
Scumbags go for the jugular A ransomware attack against blood-donation nonprofit OneBlood, which services more than 250 American hospitals, has “significantly reduced” the org’s ability to take, test, and distribute blood.… This article has been indexed from The Register –…
More than 83K certs from nearly 7K DigiCert customers must be swapped out now
Some ‘exceptional circumstances’ will be given a minor extension as lawsuits start to fly As the DigiCert drama continues, we now have a better idea of the size and scope of the problem – with the organization’s infosec boss admitting…
Russia takes aim at Sitting Ducks domains, bags 30,000+
Eight-year-old domain hijacking technique still claiming victims Dozens of Russia-affiliated criminals are right now trying to wrest control of web domains by exploiting weak DNS services.… This article has been indexed from The Register – Security Read the original article:…
Chrome adopts app-bound encryption to stymie cookie-stealing malware
Windows users now get macOS-grade secret security Google says it’s enhancing the security of sensitive data managed by Chrome for Windows users to fight the scourge of infostealer malware targeting cookies.… This article has been indexed from The Register –…
Embedding AI security from the get go
Watch this Palo Alto Networks keynote to understand the importance of visibility, control and governance in AI application and service development Sponsored Post The dawn of artificial intelligence is upon us, but its development has only just begun.… This article…
Five months after takedown, LockBit is a shadow of its former self
An unprecedented period for an unparalleled force in cybercrime Feature For roughly two years, LockBit’s ransomware operation was by far the most prolific of its kind, until the fateful events of February. After claiming thousands of victims, extorting hundreds of…