What is on HHS paper will most likely become law, Google security boss says Interview If you are responsible for infosec at a US hospital or other healthcare organization, and you treat the government’s new “voluntary” cybersecurity performance goals (CPGs)…
Tag: The Register – Security
AnyDesk revokes signing certs, portal passwords after crooks sneak into systems
Horse, meet stable door AnyDesk has copped to an IT security “incident” in which criminals broke into the remote-desktop software maker’s production systems. The biz has told customers to expect disruption as it attempts to lock down its infrastructure.… This…
Lurie Children’s Hospital back to pen and paper after cyberattack
It’s the second Chicago hospital to disclose a major incident in the same week For the second time in one week, cybercriminals have targeted a Chicago children’s hospital, this time causing significant operational disruption.… This article has been indexed from…
SBF likely off the hook for misplaced FTX funds after cops bust SIM swap ring
PLUS: more glibc vulns discovered; DraftKings hacker sentenced; and a hefty dose of critical vulnerabilities Infosec In Brief The recent indictment of a massive SIM-swapping ring may mean convicted crypto conman Sam Bankman-Fried is innocent of at least one allegation…
Researchers remotely exploit devices used to manage safe aircraft landings and takeoffs
The closest thing we may ever get to a real-life Die Hard 2 scenario Criminals could remotely tamper with the data that apps used by airplane pilots rely on to inform safe takeoff and landing procedures, according to fresh research.……
Blackbaud settles with FTC after that IT breach exposed millions of people’s info
Cloud software slinger admits no guilt, promises better basic security hygiene Blackbaud, which had data on millions of people stolen from it by one or more crooks, has promised to shore up its IT defenses in a proposed deal with…
Critical vulnerability in Mastodon is pounced upon by fast-acting admins
Danger of remote account takeovers leaves lead devs scared of releasing many details Mastodon has called admins to action following the disclosure of a critical vulnerability affecting the decentralized social network favored by erstwhile Twitter lovers.… This article has been…
Interpol’s latest cybercrime intervention dismantles ransomware, banking malware servers
Efforts part of internationally coordinated operations carried out in recent months Interpol has arrested 31 people following a three-month operation to stamp out various types of cybercrime.… This article has been indexed from The Register – Security Read the original…
Wikileaks source and former CIA worker Joshua Schulte sentenced to 40 years jail
‘Vault 7’ leak detailed cyber-ops including forged digital certs Joshua Schulte, a former CIA employee and software engineer accused of sharing material with WikiLeaks, was sentenced to 40 years in prison by the US Southern District of New York on…
Managing the hidden risks of shadow APIs
How F5 Distributed Cloud Services seal security gaps in modern app development amid growing attack surface Partner Content Application programming interfaces (APIs) play a significant role in today’s digital economy, but at the same time they can also represent a…
Cloudflare sheds more light on Thanksgiving security breach in which tokens, source code accessed by suspected spies
Atlassian systen compromised via October Okta intrusion Cloudflare has just detailed how suspected government spies gained access to its internal Atlassian installation using credentials stolen via a security breach at Okta in October.… This article has been indexed from The…
Biden will veto attempts to kill off SEC’s security breach reporting rules
Senate, House can try but won’t make it past the Prez, says White House The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission’s (SEC) strict data breach reporting rule.… This article…
Rise of deepfake threats means biometric security measures won’t be enough
Defenses need a rethink in face of increasing sophistication Cyber attacks using AI-generated deepfakes to bypass facial biometrics security will lead a third of organizations to doubt the adequacy of identity verification and authentication tools as standalone protections.… This article…
Biden will veto attempts to rip up SEC breach reporting rule
Senate, House can try but won’t make it past the Prez, says White House The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission’s (SEC) strict data breach reporting rule.… This article…
LockBit shows no remorse for ransomware attack on children’s hospital
It even had the gall to set the ransom demand at $800K … for a nonprofit Ransomware gang LockBit is claiming responsibility for an attack on a Chicago children’s hospital in an apparent deviation from its previous policy of not…
Congress told how Chinese attackers plan to incite ‘societal chaos’ in the US
American public are way ahead of them Chinese attackers are preparing to “wreak havoc” on American infrastructure and “cause societal chaos” in the US, infosec, and law enforcement bosses told a US House committee on Wednesday.… This article has been…
Ransomware payment rates drop to new low – only 29% of victims are forking over cash
It’s almost like years of false assurances have made people realize payments are pointless Trusting a ransomware crew to honor a deal isn’t the greatest idea, and the world seems to be waking up to that. The number of victims…
FBI confirms it issued remote kill command to blow out Volt Typhoon’s botnet
Remotely disinfects Cisco and Netgear routers to block Chinese critters China’s Volt Typhoon attackers used “hundreds” of outdated Cisco and NetGear routers infected with malware in an attempt to break into US critical infrastructure facilities, according to the Justice Department.……
Nearly 4-year-old Cisco vuln linked to recent Akira ransomware attacks
Evidence mounts of an exploit gatekept within Russia’s borders Security researchers believe the Akira ransomware group could be exploiting a nearly four-year-old Cisco vulnerability and using it as an entry point into organizations’ systems.… This article has been indexed from…
We know nations are going after critical systems, but what happens when crims join in?
This isn’t going to end well Volt Typhoon, the Chinese government-backed cyberspies whose infrastructure was at least partially disrupted by Uncle Sam, has been honing in on other US energy, satellite and telecommunications systems, according to Robert Lee, CEO of…