Claims to protect against DDoS, sensitive data leakage Cloudflare has tweaked its web application firewall (WAF) to add protections for applications using large language models.… This article has been indexed from The Register – Security Read the original article: Cloudflare…
Tag: The Register – Security
American Express admits card data exposed and blames third party
Don’t leave home without … IT security A security failure at a third-party vendor exposed an untold number of American Express card numbers, expiry dates, and other data to persons unknown.… This article has been indexed from The Register –…
Change Healthcare attack latest: ALPHV bags $22M in Bitcoin amid affiliate drama
No honor among thieves? ALPHV/BlackCat, the gang behind the Change Healthcare cyberattack, has received more than $22 million in Bitcoin in what might be a ransomware payment.… This article has been indexed from The Register – Security Read the original…
Seoul accuses North Korea of stealing southern chipmakers’ designs
Kim Jong Un’s all in for home-built silicon says warning North Korean government spies have broken into the servers of at least two chipmakers and stolen product designs as part of attempts to spur Kim Jong Un’s plans for a…
German defense chat overheard by Russian eavesdroppers on Cisco’s WebEx
Officials can’t tell whether the tape was edited, but fear Kremlin has more juicy bits to release in the future The German Ministry of Defense (Bundeswehr) has confirmed that a recording of a call between high-ranking officials discussing war efforts…
Ransomware ban backers insist thugs must be cut off from payday
Increasingly clear number of permanent solutions is narrowing Global law enforcement authorities’ attempts to shutter the LockBit ransomware crew have sparked a fresh call for a ban on ransomware payments to perpetrators.… This article has been indexed from The Register…
The federal bureau of trolling hits LockBit, but the joke’s on us
When you can’t lock ’em up, lock ’em out Opinion The best cop shows excel at mind games: who’s tricking whom, who really wins, and what price they pay. A twist of humor adds to the drama and keeps us…
LockBit’s contested claim of fresh ransom payment suggests it’s been well hobbled
ALSO: CISA warns Ivanti vuln mitigations might not work, SAML hijack doesn’t need ADFS, and crit vulns Infosec in brief The infamous LockBit ransomware gang has been busy in the ten days since an international law enforcement operation took down…
Ahead of Super Tuesday, US elections face existential and homegrown threats
Misinformation is rife, AI makes it easier to create, and 42 percent of the planet’s inhabitants get to vote this year Feature Two US intelligence bigwigs last week issued stark warnings about foreign threats to American election integrity and security…
Air National Guardsman Teixeira to admit he was Pentagon files leaker
Turns out bragging on Discord has unfortunate consequences Jack Teixeira, the Air National Guardsman accused of leaking dozens of classified Pentagon documents, is expected to plead guilty in a US court on Monday.… This article has been indexed from The…
Judge orders NSO to cough up Pegasus super-spyware source code
/* Hope no one ever reads these functions lmao */ NSO Group, the Israel-based maker of super-charged snoopware Pegasus, has been ordered by a federal judge in California to share the source code for “all relevant spyware” with Meta’s WhatsApp.……
Iranian charged over attacks against US defense contractors, government agencies
$10M bounty for anyone with info leading to Alireza Shafie Nasab’s identification or location The US Department of Justice has unsealed an indictment accusing an Iranian national of a years-long campaign that compromised hundreds of thousands of accounts and attempting…
In the vanguard of 21st century cyber threats
Everything you need to know about quantum safe encryption Webinar The quantum threat might seem futuristic, more like something you’d encounter in a science fiction film. But it’s arguably already a danger to real cyber security defences.… This article has…
Cops visit school of ‘wrong person’s child,’ mix up victims and suspects in epic data fail
Data watchdog reprimands police force for confusing 2 people with same name and birthday to disastrous results The UK’s Information Commissioner’s Office has put the West Midlands Police (WMP) on the naughty step after the force was found to have…
Cops visit school of ‘wrong person’s child,’ mix up victims and suspects in epic data fail
Data watchdog reprimands police force for mixing up 2 people with same name and birthday with disastrous results The UK’s Information Commissioner’s Office has put the West Midlands Police (WMP) on the naughty step after the force was found to…
Keeping one step ahead of cyber security threats
How zero trust controls and Google AI can strengthen your organization’s defences Webinar Dealing with cyber security incidents is an expensive business. Each data breach costs an estimated $4.35 million on average and it’s not as if the volume of…
NTT boss takes early retirement to atone for data leak
No mere mea culpa would suffice after 9.2 million records leaked over a decade, warnings were ignored, and lies were told NTT West president Masaaki Moribayashi announced his resignation on Thursday, effective at the end of March, in atonement for…
GitHub struggles to keep up with automated malicious forks
Cloned then compromised, bad repos are forked faster than they can be removed A malware distribution campaign that began last May with a handful of malicious software packages uploaded to the Python Package Index (PyPI) has spread to GitHub and…
Turns out cops are super interested in subpoenaing suspects’ push notifications
Those little popups may reveal location, device details, IP address, and more More than 130 petitions seeking access to push notification metadata have been filed in US courts, according to a Washington Post investigation – a finding that underscores the…
US courts fielded over 130 requests for access to push notification metadata
Cops love it because popup messages can reveal location, device details, IP address and more More than 130 petitions seeking access to push notification metadata have been filed in US courts, according to a Washington Post investigation – a finding…