National security and infosec authorities band together to help victims sniff out stealthy Russian baddies hiding in networks The offensive cyber unit linked to Russia’s Foreign Intelligence Service (SVR) is exploiting the critical vulnerability affecting the JetBrains TeamCity CI/CD server…
Tag: The Register – Security
Money-grubbing crooks abuse OAuth – and baffling absence of MFA – to do financial crimes
Business email compromise, illicit cryptomining, phishing … if it makes a dollar, this lot do it Multiple miscreants are misusing OAuth to automate financially motivated cyber crimes – such as business email compromise (BEC), phishing, large-scale spamming campaigns – and…
Surprise! Email from personal.
information.reveal@gmail.com is not going to contain good news
Internet plod highlight tactics used by cruel Karakurt crime gang Karakurt, a particularly nasty extortion gang that uses “extensive harassment” to pressure victims into handing over millions of dollars in ransom payments after compromising their IT infrastructure, pose a “significant…
The SANS Holiday Hack Challenge is back!
Skip the sleigh and sail with Santa in this year’s fun, hands-on SANS cybersecurity event Webinar Whether you are considering a career in cyber security or you already work in the industry, the 2023 SANS Holiday Hack Challenge is a…
Learning the safety language of the cloud
Protecting your cloud from cyber security threats starts by understanding what it’s telling you Webinar In China, clouds are a symbol of luck. See multiple layering of clouds in a blue sky can mean you are in line to receive…
Nearly a million non-profit donors’ details left exposed in unsecured database
Trusted by major charities, DonorView publicly exposed children’s names and addresses, among other data Close to a million records containing personally identifiable information belonging to donors that sent money to non-profits were found exposed in an online database.… This article…
Cyber security isn’t simple, but it could be
The biggest problem is a tendency to ignore problems you can’t see or haven’t looked for, says SecurityHQ Sponsored Feature Most experts agree cybersecurity is now so complex that managing it has become a security problem in itself.… This article…
Think tank report labels NSO, Lazarus, as ‘cyber mercenaries’
Sure, they do crimes. But the plausible deniability governments adore means they deserve a different label Cybercrime gangs like the notorious Lazarus group and spyware vendors like Israel’s NSO should be considered cyber mercenaries – and become the subject of…
Final Patch Tuesday of 2023 goes out with a bang
Microsoft fixed 36 flaws. Adobe addressed 212. Apple, Google, Cisco, VMware and Atlassian joined the party It’s the last Patch Tuesday of 2023, which calls for celebration – just as soon as you update Windows, Adobe, Google, Cisco, FortiGuard, SAP, VMware,…
Cloud engineer wreaks havoc on bank network after getting fired
Now he’s got two years behind bars to think about his bad choices An ex-First Republic Bank cloud engineer was sentenced to two years in prison for causing more than $220,000 in damage to his former employer’s computer network after…
Discord in the ranks: Lone Airman behind top-secret info leak on chat platform
Poor cybersecurity hygiene in the military? Surely not! There was only one US Air National Guardsman behind the leak of top-secret US military documents on Discord, but his chain of command bears some responsibility for letting it happen on their…
Northern Ireland cops count human cost of August data breach
Officers potentially targeted by dissidents can’t afford to relocate for their safety, while others seek support to change their names An official review of the Police Service of Northern Ireland’s (PSNI) August data breach has revealed the full extent of…
BlackBerry squashes plan to spin out its IoT biz
Board and incoming CEO decide reorganizing is better than splitting BlackBerry has decided its plan to split into two separate companies is not a good idea and will instead reorganize itself into two independent divisions.… This article has been indexed…
Interpol moves against human traffickers who enslave people to scam you online
Scum lure folks with promises of good jobs in crypto and then won’t let them leave Hundreds of suspected people smugglers have been arrested, and 163 potential victims rescued from servitude, as part of an Interpol-coordinated operation dubbed “Turquesa V”…
Proposed US surveillance regime would enlist more businesses
Expanded service provider definition could force cafes and hotels to spy for the feds Many US businesses may be required to assist in government-directed surveillance – depending upon which of two reform bills before Congress is approved.… This article has…
2.5M patients infected with data loss in Norton Healthcare ransomware outbreak
AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…
2.5M patents infected with data loss in Norton Healthcare ransomware outbreak
AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…
Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware
Latest offensive cyber group to switch to atypical programming for payloads Research into Lazarus Group’s attacks using Log4Shell has revealed novel malware strains written in an atypical programming language.… This article has been indexed from The Register – Security Read…
Two years on, 1 in 4 apps still vulnerable to Log4Shell
Lack of awareness still blamed for patching apathy despite it being among most infamous bugs of all time Two years after the Log4Shell vulnerability in the open source Java-based Log4j logging utility was disclosed, circa one in four applications are…
Read the clouds, reduce the cyber risk
Why a one-size- fits- all approach to cloud security is unlikely to work in multi-cloud deployments Webinar In the natural world, there are ten different kinds of cloud – a rare simplicity in meteorological terms. But in our global business…