Spy vs spy in the chips Comment Chinese state media called the US an aspiring “surveillance empire” over its proposed use of asset tracking tags to crack down on black-market GPU shipments to the Middle Kingdom.… This article has been…
Tag: The Register – Security
Microsoft’s Nuance coughs up $8.5M to rid itself of MOVEit breach suit
Supply chain breach has been a major target of legal action Microsoft-owned talk-to-text outfit Nuance has agreed to cough up $8.5 million to settle a class action lawsuit over the sprawling MOVEit Transfer mega-breach – although it admits no liability.……
Workday warns of CRM breach after social engineers make off with business contact details
HR SaaS giant insists core systems untouched Workday has admitted that attackers gained access to one of its third-party CRM platforms, but insists its core systems and customer tenants are untouched.… This article has been indexed from The Register –…
Boffins say tool can sniff 5G traffic, launch ‘attacks’ without using rogue base stations
Sni5Gect research crew targets sweet spot during device / network handshake pause Security boffins have released an open source tool for poking holes in 5G mobile networks, claiming it can do up- and downlink sniffing and a novel connection downgrade…
Every question you ask, every comment you make, I’ll be recording you
When you’re asking AI chatbots for answers, they’re data-mining you Opinion Recently, OpenAI ChatGPT users were shocked – shocked, I tell you! – to discover that their searches were appearing in Google search. You morons! What do you think AI…
Someone’s poking the bear with infostealers targeting Russian crypto developers
If you wanted to hurt Putin’s ransomware racketeers, these info-stealing npm packages are one way to do it Researchers at software supply chain security outfit Safety think they’ve found malware that targets Russian cryptocurrency developers, and perhaps therefore Russia’s state-linked…
P2P payment service Zelle sued for enabling payment fraud hell
PLUS: Kryptos solution up for auction; Canadian parliament springs a leak; Fake crypto lawyers; And more Infosec In Brief New York State is suing bank-owned peer-to-peer payment app Zelle, claiming that the banks behind it knew fraud was rampant on…
Election workers fear threats and intimidation without feds’ support in 2026
‘Hope for the best, but prepare for the worst,’ one tells The Reg Feature Bill Gates, an Arizona election official and former Maricopa County supervisor, says that the death threats started shortly after the 2020 presidential election.… This article has…
Typhoon-adjacent Chinese crew broke into Taiwanese web host
Is that a JuicyPotato on your network? A suspected Chinese-government-backed cyber crew recently broke into a Taiwanese web hosting provider to steal credentials and plant backdoors for long-term access, using a mix of open-source and custom software tools, Cisco Talos…
Cisco’s Secure Firewall Management Center now not-so secure, springs a CVSS 10 RCE hole
Switchzilla’s summer of perfect 10s Cisco has issued a patch for a maximum-severity bug in its Secure Firewall Management Center (FMC) software that could allow an unauthenticated, remote attacker to inject arbitrary shell commands on vulnerable systems.… This article has…
Cyberattack on Dutch prosecution service is keeping speed cameras offline
Who knew zero-days could be so useful to highway speedsters? The lingering effects of a cyberattack on the Public Prosecution Service of the Netherlands are preventing it from reactivating speed cameras across the country.… This article has been indexed from…
Telco giant Colt suffers attack, takes systems offline
London-based multinational takes customer portal and Voice API platform offline as ‘protective measure’ following breach Multinational telco Colt Technology Services says a “cyber incident” is to blame for its customer portal and other services being down for a number of…
LLM chatbots trivial to weaponise for data theft, say boffins
System prompt engineering turns benign AI assistants into ‘investigator’ and ‘detective’ roles that bypass privacy guardrails A team of boffins is warning that AI chatbots built on large language models (LLM) can be tuned into malicious agents to autonomously harvest…
Should UK.gov save money by looking for open source alternatives to Microsoft? You decide
As £9 billion MoU sparks debate about value for money, it’s time to have your say Register debate series It’s a lot of money, £9 billion ($12 billion). Especially for a government which finds itself — for whatever reason —…
Ransomware crews don’t care about your endpoint security – they’ve already killed it
Some custom malware, some legit software tools At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal, allowing them to bypass almost every major endpoint security tool on the market, escalate privileges, and ultimately steal…
Psst: wanna buy a legit FBI email account for $40?
Government and police employee credentials sold at bargain-basement prices on underground forums Criminals are selling access to FBI and other law enforcement and government email accounts to other criminals via dark web marketplaces for as little as $40.… This article…
‘MadeYouReset’ HTTP/2 flaw lets attackers DoS servers
Researchers had to notify over 100 vendors of flaw that builds on 2023’s Rapid Reset with neat twist past usual mitigations Security researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel have published details of a “common design flaw” in…
Lock down your critical infrastructure, CISA begs admins
The agency offered some tips for operational technology environments, where attacks are rising CISA is urging companies with operational technology environments to set a better cybersecurity posture, and not just by adopting some new best practices and purchasing some new…
BtcTurk suspends operations amid alleged $49M hot wallet heist
Turkish exchange is the latest victim of a recent spate of major crypto thefts Turkish cryptocurrency exchange BtcTurk is halting all deposits and withdrawals amid fears that blockchain bandits succeeded in significantly compromising its hot wallets.… This article has been…
Law and water: Russia blamed for US court system break-in and Norwegian dam drama
Moscow-linked miscreants accused of swiping sealed US court files and fiddling with a Norwegian dam’s floodgates Russian attackers reportedly spent months rummaging through the US federal court’s creaky case-management system, while Norway reckons the same Kremlin-friendly miscreants took control of…
Italian hotels breached en masse since June, government confirms
Nearly 100,000 records allegedly up for sale after apparent breach at booking system Italy’s digital agency (AGID) says a cybercriminal’s claims concerning a spate of data thefts affecting various hotels across the country are genuine.… This article has been indexed…
Stock in the Channel pulls website amid cyberattack
Intruders accessed important systems but tells customers their data is safe A UK-based multinational that provides tech stock availability tools is telling customers that its website outage is due to a cyber attack.… This article has been indexed from The…
The £9 billion question: To Microsoft or not to Microsoft?
Are UK taxpayers getting real value from SPA24 — or just high cost convenience? Register debate series The UK government’s five-year Strategic Partnership Agreement (SPA24) with Microsoft is set to see public sector bodies spend around £1.9 billion each year—nearly…
Fortinet discloses critical bug with working exploit code amid surge in brute-force attempts
If there’s smoke? Fortinet warned customers about a critical FortiSIEM bug that could allow an unauthenticated attacker to execute unauthorized commands, and said working exploit code for the flaw has been found in the wild.… This article has been indexed…
Crooks can’t let go: Active attacks target Office vuln patched 8 years ago
CVE-2017-11882 in discontinued Equation Editor still attracting keylogger campaigns despite software being killed off in 2018 Very few people are immune to the siren song of nostalgia, a yearning for a “better time” when this was all fields and kids…
UK expands police facial recognition rollout with 10 new vans heading to a town near you
Seven additional regions across England will now have access to the controversial tech A fresh expansion of UK crimefighters’ access to live facial recognition (LFR) technology is being described by officials as “an excellent opportunity for policing.” Privacy campaigners diagree.……
Marc Andreessen wades into the UK’s Online Safety Act furor
Shock news: billionaire techpreneur is not a fan Geek-turned-venture-capitalist Marc Andreessen has weighed in on the arguments surrounding the UK’s Online Safety Act, accusing the UK government of leaking his input.… This article has been indexed from The Register –…
Microsoft wares may be UK public sector’s only viable option
For now at least – even though government buying can improve, open-source is not all its cracked up to be Debate Not for the first time, Microsoft is in the spotlight for the UK government’s money it voraciously consumes –…
Secure chat darling Matrix admits pair of ‘high severity’ protocol flaws need painful fixes
Foundation warns federated servers face biggest risk, but single-instance users can take their time The maintainers of the federated secure chat protocol Matrix are warning users of a pair of “high severity protocol vulnerabilities,” addressed in the latest version, saying…
Ransomware crew spills Saint Paul’s 43GB of secrets after city refuses to cough up cash
Minnesota’s capital is the latest to feature on Interlock’s leak blog after late-July cyberattack The Interlock ransomware gang has flaunted a 43GB haul of files allegedly stolen from the city of Saint Paul, following a late-July cyberattack that forced the…
Crypto-crasher Do Kwon admits guilt over failed not-so-stablecoin that erased $41 billion
Tells court ‘What I did was wrong and I want to apologize for my conduct’ Terraform Labs founder Do Kwon has pled guilty to committing fraud when promoting the so-called “stablecoin” Terra USD and now faces time in jail.… This…
Crypto crasher Do Kwon admits guilt over failed not-so-stablecoin that erased $41 billion
Tells court ‘What I did was wrong and I want to apologize for my conduct’ Terraform Labs founder Do Kwon has pled guilty to committing fraud when promoting the so-called “stablecoin” Terra USD and now faces time in jail.… This…
Microsoft’s Patch Tuesday baker’s dozen: 12 critical bugs plus a SharePoint RCE
None under active exploit…yet Microsoft’s August Patch Tuesday flaw-fixing festival addresses 111 problems in its products, a dozen of which are deemed critical, and one moderate-severity flaw that is listed as being publicly known.… This article has been indexed from…
Manpower franchise discloses data theft after RansomHub posts alleged stolen data
And yes, there’s the usual credit monitoring Global staffing firm Manpower confirmed ransomware criminals broke into its Lansing, Michigan franchise’s network and stole personal information belonging to 144,189 people, months after the extortionists claimed that they pilfered “all of [the…
Major outage at Pennsylvania Attorney General’s Office blamed on ‘cyber incident’
Website, emails, and phones are down for a second day The Pennsylvania’s Office of Attorney General (OAG) is blaming a digital blackout of its services on a “cyber incident.”… This article has been indexed from The Register – Security Read…
BlackSuit ransomware crew loses servers, domains, and $1m in global shakedown
US cops yank servers, domains, and crypto from the Russia-linked gang – but the crooks remain at large In a display of bureaucratic bravado, US law enforcement agencies say they’ve “disrupted” the BlackSuit ransomware gang (also known as Royal), freeing…
Oh, great.Three notorious cybercrime gangs appear to be collaborating
Scattered Spider, ShinyHunters, and Lapsus$ spent the weekend bragging to each other on a Telegram channel Prolific cybercrime collectives Scattered Spider, ShinyHunters, and Lapsus$ appear to have come together in a new Telegram channel that shares news of their exploits.……
Hyundai: Want cyber-secure car locks? That’ll be £49, please
Automaker’s answer to spate of car thefts is to charge customers for extra Hyundai is charging UK customers £49 ($66) for a security upgrade to prevent thieves from bypassing its car locks.… This article has been indexed from The Register…
The White House could end UK’s decade-long fight to bust encryption
Home Office officials reportedly concede Brit government on back foot as Trump moves to protect US Big Tech players Analysis The Home Office’s war on encryption – its most technically complex and controversial aspect of modern policymaking yet – is…
Poisoned telemetry can turn AIOps into AI Oops, researchers show
Sysadmins, your job is safe Automating IT operations using AI may not be the best idea at the moment.… This article has been indexed from The Register – Security Read the original article: Poisoned telemetry can turn AIOps into AI…
Russia’s RomCom among those exploiting a WinRAR 0-day in highly-targeted attacks
A few weeks earlier ‘zeroplayer’ advertised an $80K WinRAR 0-day exploit Russia-linked attackers found and exploited a high-severity WinRAR vulnerability before the maintainers of the Windows file archiver issued a fix.… This article has been indexed from The Register –…
US scrambles to recoup $1M+ nicked by NORKs
The alleged perpetrators remain at large The US Department of Justice is trying to recoup around $1 million that three IT specialists secretly working for the North Korean government allegedly stole from a New York company.… This article has been…
Red teams are safe from robots for now, as AI makes better shield than spear
The bad news? The machines, and their operators, are coming on fast Black Hat/DEF CON At the opening of Black Hat, the largest security shindig in the Hacker Summer Camp week ahead of DEF CON and BSides, the opening keynote…
Wikimedia Foundation loses first court battle to swerve Online Safety Act regulation
But it can contest if it lands up in ‘Category 1,’ and the move hurts operations, says judge Wikipedia today lost a legal battle against the UK’s tech secretary to tighten the criteria around the Online Safety Act 2023 (OSA),…
Intel chief Lip-Bu Tan to visit White House after Trump calls for him to step down
Amid hints by president he may announce 100% tariffs on imported chips, semiconductors Intel boss Lip-Bu Tan reportedly has an appointment at the White House today, just days after President Donald Trump called for his resignation. The move comes as…
Deepfake detectors are slowly coming of age, at a time of dire need
By video, picture, and voice – the fakers are coming for your money DEF CON While AI was on everyone’s lips in Las Vegas this week at the trio of security conferences in Sin City – BSides, Black Hat, AND…
UK retail giant M&S restores Click & Collect months after cyber attack, some services still down
Many core offerings now back in action, says retailer British retailer Marks and Spencer updated its website today, confirming its Click & Collect service is once again available to customers.… This article has been indexed from The Register – Security…
Your CV is not fit for the 21st century – time to get it up to scratch
And yes, that means (retch) catering to AI searchers The job market is queasy and since you’re reading this, you need to upgrade your CV. It’s going to require some work to game the poorly trained AIs now doing so…
Trend Micro offers weak workaround for already-exploited critical vuln in management console
PLUS: Crypto mixer founders plead guilty; Another French telco hacked; Meta fights WhatsApp scams; And more! Infosec In Brief A critical vulnerability in the on-prem version of Trend Micro’s Apex One endpoint security platform is under active exploitation, the company…
DEF CON hackers plug security holes in US water systems amid tsunami of threats
Five pilot deployments are just a drop in the bucket, so it’s time to turbo scale def con A DEF CON hacker walks into a small-town water facility…no, this is not the setup for a joke or a (super-geeky) odd-couple…
The inside story of the Telemessage saga, and how you can view the data
It turns out no one was clean on OPSEC DEF CON On Saturday at DEF CON, security boffin Micah Lee explained just how he hacked into TeleMessage, the supposedly secure messaging app used by White House officials, which in turn…
Chinese biz using AI to hit US politicians, influencers with propaganda
In misinformation, Russia might be the top dog but the Chinese are coming warns former NSA boss DEF CON A cache of documents uncovered by Vanderbilt University has revealed disturbing details about how a Chinese company is building up a…
Star leaky app of the week: StarDict
Fun feature found in Debian 13: send your selected text to China – in plaintext As Trixie gets ready to début, a little-known app is hogging the limelight: StarDict, which sends whatever text you select, unencrypted, to servers in China.……
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
Tells The Reg China’s ability to p0wn Redmond’s wares ‘gives me a political aneurysm’ Comment Roger Cressey served two US presidents as a senior cybersecurity and counter-terrorism advisor and currently worries he’ll experience a “political aneurysm” due to Microsoft’s many…
Infosec hounds spot prompt injection vuln in Google Gemini apps
Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed Black hat A trio of researchers has disclosed a major prompt injection vulnerability in Google’s Gemini large language model-powered applications.… This…
UK secretly allows facial recognition scans of passport, immigration databases
Campaigners brand Home Office’s lack of transparency as ‘astonishing’ and ‘dangerous’ Privacy groups report a surge in UK police facial recognition scans of databases secretly stocked with passport photos lacking parliamentary oversight.… This article has been indexed from The Register…
UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act
It’s ‘more than a temporary trend,’ Decodo claims Amid the furor around surging VPN usage in the UK, many users are eyeing proxies as a potential alternative to the technology.… This article has been indexed from The Register – Security…
Prohibition never works, but that didn’t stop the UK’s Online Safety Act
Will someone think of the deals politicians are making? Opinion You might think, since I write about tech all the time, my degrees are in computer science. Nope. I’m a bona fide, degreed historian, which is why I can say…
Why blow up satellites when you can just hack them?
A pair of German researchers showed how easy it is Black Hat Four countries have now tested anti-satellite missiles (the US, China, Russia, and India), but it’s much easier and cheaper just to hack them.… This article has been indexed…
German security researchers say ‘Windows Hell No’ to Microsoft biometrics for biz
Hello loophole could let a rogue admin, or a pwned one, inject new facial scans Black Hat Microsoft is pushing hard for Windows users to shift from using passwords to its Hello biometrics system, but researchers sponsored by the German…
Microsoft, CISA warn yet another Exchange server bug can lead to ‘total domain compromise’
No reported in-the-wild exploits…yet Microsoft and the feds late Wednesday sounded the alarm on another high-severity bug in Exchange Server hybrid deployments that could allow attackers to escalate privileges from on-premises Exchange to the cloud.… This article has been indexed…
CISA releases malware analysis for Sharepoint Server attack
Indications of compromise and Sigma rules report for your security scanners amid ongoing ‘ToolShell’ blitz CISA has published a malware analysis report with compromise indicators and Sigma rules for “ToolShell” attacks targeting specific Microsoft SharePoint Server versions.… This article has…
Black Hat’s network ops center brings rivals together for a common cause
The Reg goes behind the scenes of the conference NOC, where volunteers ‘look for a needle in a needle stack’ Black Hat Neil “Grifter” Wyler is spending the week “looking for a needle in a needle stack,” a task he’ll…
KLM, Air France latest major organizations looted for customer data
Watch out, the phishermen are about, customers told European airline giants Air France and KLM say they are the latest in a string of major organizations to have their customers’ data stolen by way of a break-in at a third…
Meta training AI on social media posts? Only 7% in Europe think it’s OK
Privacy campaigner Max Schrem’s NOYB is back on Zuck’s back Meta’s enthusiasm for training its AI on user data is not shared by the users themselves – at least for some Europeans – according a study commissioned by Facebook legal…
Amnesty slams Elon Musk’s X for ‘central role’ in fueling 2024 UK riots
Human rights org calls for greater accountability and stronger enforcement of Online Safety Act Amnesty International claims Elon Musk’s X platform “played a central role” in pushing the misinformation that stoked racially charged violence following last year’s Southport murders.… This…
Could agentic AI save us from the cybercrisis?
Many hands make light work in the SOC Sponsored feature The cyberthreat landscape is evolving fast, with highly organized bad actors launching ever more devastating and sophisticated attacks against often ill-prepared targets.… This article has been indexed from The Register…
Microsoft researchers bullish on AI security agent even though it let 74% of malware slip through
Project Ire promises to use LLMs to detect whether code is malicious or benign Microsoft has rolled out an autonomous AI agent that it claims can detect malware without human assistance.… This article has been indexed from The Register –…
Google says the group behind last year’s Snowflake attack slurped data from one of its Salesforce instances
ShinyHunters suspected in rash of intrusions Google confirmed that criminals breached one of its Salesforce databases and stole info belonging to some of its small-and-medium-business customers.… This article has been indexed from The Register – Security Read the original article:…
Vibe coding tool Cursor’s MCP implementation allows persistent code execution
More evidence that AI expands the attack surface Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a previously approved Model Context…
Patch now: Millions of Dell PCs with Broadcom chips vulnerable to attack
Psst, wanna steal someone’s biometrics? black hat Critical security flaws in Broadcom chips used in more than 100 models of Dell computers could allow attackers to take over tens of millions of users’ devices, steal passwords, and access sensitive data,…
Study finds humans not completely useless at malware detection
Some pinpointed software nasties but were suspicious of printer drivers too Researchers from the Universities of Guelph and Waterloo have discovered exactly how users decide whether an application is legitimate or malware before installing it – and the good news…
Chained bugs in Nvidia’s Triton Inference Server lead to full system compromise
Wiz Research details flaws in Python backend that expose AI models and enable remote code execution Security researchers have lifted the lid on a chain of high-severity vulnerabilities that could lead to remote code execution (RCE) on Nvidia’s Triton Inference…
Hacker summer camp: What to expect from BSides, Black Hat, and DEF CON
These are the conference events to keep an eye on. You can even stream a few The security industry is hitting Vegas hard this week with three conferences in Sin City that bring the world’s largest collection of security pros…
Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor
‘Plague’ malware has been around for months without tripping alarms Researchers at German infosec services company Nextron Threat have spotted malware that creates a highly-persistent Linux backdoor and say antivirus engines do not flag the code as malicious.… This article…
SonicWall investigates ‘cyber incidents,’ including ransomware targeting suspected 0-day
Bypassing MFA and deploying ransomware…sounds like something that rhymes with ‘schmero-day’ SonicWall on Monday confirmed that it’s investigating a rash of ransomware activity targeting its firewall devices, following multiple reports of a zero-day bug under active exploit in its VPNs.……
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
PXA Stealer pilfers data from nearly 40 browsers, including Chrome More than 4,000 victims across 62 countries have been infected by stealthy infostealers pilfering people’s passwords, credit card numbers, and browser cookies, which are then sold to other criminals on…
Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons
Devs told to exercise ‘extreme caution’ with emails disguised as account update prompts Mozilla is warning of an ongoing phishing campaign targeting developers of Firefox add-ons.… This article has been indexed from The Register – Security Read the original article:…
German phone repair biz collapses following 2023 ransomware attack
Founder miffed over prosecutors holding onto its Bitcoin The founder of a German mobile phone repair and insurance biz has begun insolvency proceedings for some operations in his company after struggling financially following a costly ransomware attack in 2023.… This…
When hyperscalers can’t safeguard one nation’s data from another, dark clouds are ahead
If it’s not on-prem, it’s on the menu Opinion The details of cloud data regionalization are rarely the stuff of great drama. When they’ve reached the level of an exe admitting to the Senate that a foreign power can help…
Millions of age checks performed as UK Online Safey Act gets rolling
But its ok claims Brit government, no personal data stored ‘unless absolutely necessary’ The UK government has reported that an additional five million age checks are being made daily as UK-based internet users seek to access age-restricted sites following the…
China’s botched Great Firewall upgrade invites attacks on its censorship infrastructure
Attempts to censor QUIC traffic create chance to block access to offshore DNS resolvers China’s attempts to censor traffic carried using Quick UDP Internet Connections (QUIC) are imperfect and have left the country at risk of attacks that degrade its…
Lazarus Group rises again, this time with malware-laden fake FOSS
PLUS: Slow MFA rollout costs Canucks $5m; Lawmakers ponder Stingray ban; MSFT tightens Teams; And more! Infosec In Brief North Korea’s Lazarus Group has changed tactics and is now creating malware-laden open source software.… This article has been indexed from…
Silent Push CEO on cybercrime takedowns: ‘It’s an ongoing cat-and-mouse game’
Plus: why takedowns aren’t in threat-intel analysts’ best interest interview It started out small: One US financial services company wanted to stop unknown crooks from spoofing their trading app, tricking customers into giving the digital thieves their login credentials and…
CISA roasts unnamed critical national infrastructure body for shoddy security hygiene
Plaintext passwords, shared admin accounts, and insufficient logging rampant at mystery org CISA is using the findings from a recent probe of an unidentified critical infrastructure organization to warn about the dangers of getting cybersecurity seriously wrong.… This article has…
OpenAI removes ChatGPT self-doxing option
Checkbox to make chatbot conversations appear in search engines deemed a footgun OpenAI has removed the option to make ChatGPT interactions indexable by search engines to prevent users from unwittingly exposing sensitive information.… This article has been indexed from The…
Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks
Our tests have shown there are ways to get around the promised security improvements exclusive Microsoft Recall, the AI app that takes screenshots of what you do on your PC so you can search for it later, has a filter…
China says US spies exploited Microsoft Exchange zero-day to steal military info
Spy vs. spy China has accused US intelligence agencies of exploiting a Microsoft Exchange zero-day exploit to steal defense-related data and take over more than 50 devices belonging to a “major Chinese military enterprise” for nearly a year.… This article…
Florida prison email blunder exposes visitor contact info to inmates
Victims fear leak at Everglades Correctional Institution could lead to violent extortion A data breach at a Florida prison has inmates’ families concerned for their welfare after their contact details were allegedly leaked to convicted criminals.… This article has been…
Cybercrooks attached Raspberry Pi to bank network and drained ATM cash
Criminals used undocumented techniques and well-placed insiders to remotely withdraw money A ring of cybercriminals managed to physically implant a Raspberry Pi on a bank’s network to steal cash from an Indonesian ATM.… This article has been indexed from The…
Top spy says LinkedIn profiles that list defence work ‘recklessly invite attention of foreign intelligence services’
Workers on joint US/UK/Australia nuclear submarine program are painting a target on themselves The Director-General of Security at the Australian Security Intelligence Organization (ASIO) has lamented the fact that many people list their work in the intelligence community or on…
As ransomware gangs threaten physical harm, ‘I am afraid of what’s next,’ ex-negotiator says
Crims warned 40% of respondents that they and their families would suffer Ransomware gangs now frequently threaten physical violence against employees and their families as a way to force victim organizations into paying their demands.… This article has been indexed…
Gene scanner pays $9.8 million to get feds off its back in security flap
Illumina allegedly lied about its testing devices meeting government standards Biotech firm Illumina has agreed to cut the US government a check for the eminently affordable amount of $9.8 million to resolve allegations that it has been selling the feds…
Microsoft’s Azure AI Speech needs just seconds of audio to spit out a convincing deepfake
No way this will be abused Microsoft has upgraded Azure AI Speech so that users can rapidly generate a voice replica with just a few seconds of sampled speech.… This article has been indexed from The Register – Security Read…
Beijing summons Nvidia over alleged backdoors in China-bound AI chips
H20 silicon under the microscope after slipping through US export bans China’s internet watchdog has hauled Nvidia in for a grilling over alleged backdoors in its H20 chips, the latest twist in the increasingly paranoid semiconductor spat between Washington and…
Kremlin goons caught abusing ISPs to spy on Moscow-based diplomats, Microsoft says
Russia spying on foreign embassies? Say it ain’t so Russian cyberspies are abusing local internet service providers’ networks to target foreign embassies in Moscow and collect intel from diplomats’ devices, according to a Microsoft Threat Intelligence warning.… This article has…
Silk Typhoon spun a web of patents for offensive cyber tools, report says
US court docs reveal that infamous Chinese snoops filed IP papers like tax returns Security researchers have uncovered more than a dozen patents for offensive cybersecurity tools filed by Chinese companies allegedly tied to Beijing’s Silk Typhoon espionage crew.… This…
Brit watchdog pushes to rein in Microsoft and AWS with ‘strategic market status’
Regulators around the globe pay attention as results of 21-month cloud probe published Britain’s competition regulator says Microsoft and AWS are using their dominance to harm UK cloud customers and proposes to designate both with strategic market status (SMS) to…
NHS disability equipment provider on brink of collapse a year after cyberattack
Government officials say they are monitoring the situation A major supplier of healthcare equipment to the UK’s National Health Service and local councils is on the verge of collapse 16 months after falling victim to cyber criminals.… This article has…
Banning VPNs to protect kids? Good luck with that
UK’s Online Safety Act kicks off about as well as everyone expected Analysis With the UK’s Online Safety Act (OSA) now in effect, it was only a matter of time before tech-savvy under-18s figured out how to bypass the rules…