Still available in Hong Kong and Macau, for now Apple has removed four apps from its China-regional app store, including Meta’s WhatsApp and Threads, after it was ordered to do so by Beijing for security reasons.… This article has been…
Tag: The Register – Security
Cybercriminals threaten to leak all 5 million records from stolen database of high-risk individuals
It’s the second time the World-Check list has fallen into the wrong hands The World-Check database used by businesses to verify the trustworthiness of users has fallen into the hands of cybercriminals.… This article has been indexed from The Register…
Germany cuffs alleged Russian spies over plot to bomb industrial and military targets
Apparently an attempt to damage Ukraine’s war effort Bavarian state police have arrested two German-Russian citizens on suspicion of being Russian spies and planning to bomb industrial and military facilities that participate in efforts to assist Ukraine defend itself against…
Ransomware feared as IT ‘issues’ force Octapharma Plasma to close 150+ centers
Source blames BlackSuit infection – as ISP Frontier confirms cyberattack Octapharma Plasma has blamed IT “network issues” for the ongoing closure of its 150-plus centers across the US. It’s feared a ransomware infection may be the root cause of the…
Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims
‘I want to buy a car. That’s all’ Crooks are exploiting month-old OpenMetadata vulnerabilities in Kubernetes environments to mine cryptocurrency using victims’ resources, according to Microsoft.… This article has been indexed from The Register – Security Read the original article:…
House passes bill banning Uncle Sam from snooping on citizens via data brokers
Vote met strong opposition from Biden’s office A draft law to restrict the US government’s ability to procure data on citizens through data brokers will progress to the Senate after being passed in the House of Representatives.… This article has…
Korean researcher details scheme abusing Apple’s third-party pickup policy
Criminals make lucrative use of stolen credit cards Speaking at Black Hat Asia on Thursday, a Korean researcher revealed how the discovery of one phishing website led to uncovering an operation whose activities leveraged second-hand shops and included using Apple’s…
185K people’s sensitive data in the pits after ransomware raid on Cherry Health
Extent of information seized will be a concern for those affected Ransomware strikes at yet another US healthcare organization led to the theft of sensitive data belonging to just shy of 185,000 people.… This article has been indexed from The…
EU tells Meta it can’t paywall privacy
Platforms should not confront users with ‘binary choice’ over personal data use The EU’s Data Protection Board (EDPB) has told large online platforms they should not offer users a binary choice between paying for a service and consenting to their…
Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op
Police mimic Spotify Wrapped videos to let crims know they’re being hunted Feature Cops have brought down a dark-web souk that provided cyber criminals with convincing copies of trusted brands’ websites for use in phishing campaigns.… This article has been…
Cisco creates architecture to improve security and sell you new switches
Hypershield detects bad behavior and automagically reconfigures networks to snuff out threats Cisco has developed a product called Hypershield that it thinks represents a new way to do network security.… This article has been indexed from The Register – Security…
Singapore infosec boss warns China/West tech split will be bad for interoperability
When you decide not to trust a big chunk of the supply chain, tech (and trade) get harder One of the biggest challenges Singapore faces is the potential for a split between tech stacks developed and used by China and…
Taiwanese film studio snaps up Chinese surveillance camera specialist Dahua
Stymied by sanctions, it had to go … but where? Chinese surveillance camera manufacturer Zhejiang Dahua Technology, which has found itself on the USA’s entity list of banned orgs, has fully sold off its stateside subsidiary for $15 million to…
Hugely expanded Section 702 surveillance powers set for US Senate vote
Opponents warn almost anyone could be asked to share info with Uncle Sam On Thursday the US Senate is expected to reauthorize the contentious warrantless surveillance powers conferred by Section 702 of the Foreign Intelligence Surveillance Act (FISA), and may…
Kremlin’s Sandworm blamed for cyberattacks on US, European water utilities
Water tank overflowed during one system malfunction, says Mandiant The Russian military’s notorious Sandworm crew was likely behind cyberattacks on US and European water plants that, in at least one case, caused a tank to overflow.… This article has been…
Exploit code for Palo Alto Networks zero-day now public
Race on to patch as researchers warn of mass exploitation of directory traversal bug Various infosec researchers have released proof-of-concept (PoC) exploits for the maximum-severity vulnerability in Palo Alto Networks’ PAN-OS used in GlobalProtect gateways.… This article has been indexed…
OpenAI’s GPT-4 can exploit real vulnerabilities by reading security advisories
While some other LLMs appear to flat-out suck AI agents, which combine large language models with automation software, can successfully exploit real world security vulnerabilities by reading security advisories, academics have claimed.… This article has been indexed from The Register…
Japanese government rejects Yahoo! infosec improvement plan
Just doesn’t believe it will sort out the mess that saw data leak from LINE messaging app Japan’s government has considered the proposed security improvements developed by Yahoo!, found them wanting, and ordered the onetime web giant to take new…
Fire in the Cisco! Networking giant’s Duo MFA message logs stolen in phish attack
Also warns of brute force attacks targeting its own VPNs, Check Point, Fortinet, SonicWall and more Cisco is fighting fires on a couple cybersecurity fronts this week involving its Duo multi-factor authentication (MFA) service and its remote-access VPN services.… This…
Fire in the Cisco! Networking giant’s Duo MFA leaks message logs
Also warns of brute force attacks targeting its own VPNs, Check Point, Fortinet, SonicWall and more Cisco is fighting fires on a couple fronts this week after security incidents involving its Duo multi-factor authentication (MFA) service and its remote-access VPN…