Expanded service provider definition could force cafes and hotels to spy for the feds Many US businesses may be required to assist in government-directed surveillance – depending upon which of two reform bills before Congress is approved.… This article has…
Tag: The Register – Security
2.5M patients infected with data loss in Norton Healthcare ransomware outbreak
AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…
2.5M patents infected with data loss in Norton Healthcare ransomware outbreak
AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…
Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware
Latest offensive cyber group to switch to atypical programming for payloads Research into Lazarus Group’s attacks using Log4Shell has revealed novel malware strains written in an atypical programming language.… This article has been indexed from The Register – Security Read…
Two years on, 1 in 4 apps still vulnerable to Log4Shell
Lack of awareness still blamed for patching apathy despite it being among most infamous bugs of all time Two years after the Log4Shell vulnerability in the open source Java-based Log4j logging utility was disclosed, circa one in four applications are…
Read the clouds, reduce the cyber risk
Why a one-size- fits- all approach to cloud security is unlikely to work in multi-cloud deployments Webinar In the natural world, there are ten different kinds of cloud – a rare simplicity in meteorological terms. But in our global business…
23andMe responds to breach with new suit-limiting user terms
Also: ‘well-known Bay Area tech’ firm’s laptops stolen and check out some critical vulns Security in brief The saga of 23andMe’s mega data breach has reached something of a conclusion, with the company saying its probe has determined millions of…
VictoriaMetrics takes organic growth over investor pressure
Keeping the lights on with an enterprise product while staying true to your roots Interview Monitoring biz VictoriaMetrics is relatively unusual in its field. It is yet to accept external investment, preferring instead to try to grow organically rather than…
Hollywood plays unwitting Cameo in Kremlin plot to discredit Zelensky
Microsoft spots surge in pro-Russia exploits of video platform to spread propaganda An unknown pro-Russia influence group spent time recruiting unwitting Hollywood actors to assist in smear campaigns against Ukraine and its president Volodymyr Zelensky.… This article has been indexed…
Competing Section 702 surveillance bills on collision path for US House floor
End-of-year deadline looms on US surveillance Two competing bills to reauthorize America’s FISA Section 702 spying powers advanced in the House of Representatives committees this week, setting up Congress for a battle over warrantless surveillance before the law lapses in…
That call center tech scammer could be a human trafficking victim
Interpol increasingly concerned as abject abuse of victims scales far beyond Asia origins Human trafficking for the purposes of populating cyber scam call centers is expanding beyond southeast Asia, where the crime was previously isolated.… This article has been indexed…
Polish train maker denies claims its software bricked rolling stock maintained by competitor
Says it was probably hacked, which isn’t good news either A trio of Polish security researchers claim to have found that trains built by Newag SA contain software that sabotages them if the hardware is serviced by competitors.… This article…
Five Eyes nations warn Moscow’s mates at the Star Blizzard gang have new phishing targets
The Russians are coming! Err, they’ve already infiltrated UK, US inboxes Russia-backed attackers have named new targets for their ongoing phishing campaigns, with defense-industrial firms and energy facilities now in their sights, according to agencies of the Five Eyes alliance.……
Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets
Akamai says it reported the flaws to Microsoft. Redmond shrugged A series of attacks against Microsoft Active Directory domains could allow miscreants to spoof DNS records, compromise Active Directory and steal all the secrets it stores, according to Akamai security…
US and EU infosec authorities pen intel-sharing pact
As Cyber Solidarity Act edges closer to full adoption in Europe The US Cybersecurity and Infrastructure Security Agency (CISA) has signed a working arrangement with its EU counterparts to increase cross-border information sharing and more to tackle criminals.… This article…
Yet another UK public sector data blab, this time info of pregnant women, cancer patients
NHS Trust admits highly sensitive data left online for nearly three years More than 22,000 patients of Cambridge University Hospitals NHS Foundation Trust were hit by data leaks that took place between 2020 and 2021.… This article has been indexed…
Belgian man charged with smuggling sanctioned military tech to Russia and China
Indictments allege plot to shift FPGAs, accelerometers, and spycams A Belgian man has been arrested and charged for his role in a years-long smuggling scheme to export military-grade electronics from the US to Russia and China.… This article has been…
Australia building ‘top secret’ cloud to catch up and link with US, UK intel orgs
Plans to share ‘vast amounts of data’ – very carefully Australia is building a top-secret cloud to host intelligence data and share it with the US and UK, which have their own clouds built for the same purpose.… This article…
Apple and some Linux distros are open to Bluetooth attack
Issue has been around since at least 2012 A years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm…
Locking down the edge
Watch this webinar to find out how Zero Trust fits into the edge security ecosystem Sponsored Post Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed…