The Reg goes behind the scenes of the conference NOC, where volunteers ‘look for a needle in a needle stack’ Black Hat Neil “Grifter” Wyler is spending the week “looking for a needle in a needle stack,” a task he’ll…
Tag: The Register – Security
CISA releases malware analysis for Sharepoint Server attack
Indications of compromise and Sigma rules report for your security scanners amid ongoing ‘ToolShell’ blitz CISA has published a malware analysis report with compromise indicators and Sigma rules for “ToolShell” attacks targeting specific Microsoft SharePoint Server versions.… This article has…
KLM, Air France latest major organizations looted for customer data
Watch out, the phishermen are about, customers told European airline giants Air France and KLM say they are the latest in a string of major organizations to have their customers’ data stolen by way of a break-in at a third…
Meta training AI on social media posts? Only 7% in Europe think it’s OK
Privacy campaigner Max Schrem’s NOYB is back on Zuck’s back Meta’s enthusiasm for training its AI on user data is not shared by the users themselves – at least for some Europeans – according a study commissioned by Facebook legal…
Amnesty slams Elon Musk’s X for ‘central role’ in fueling 2024 UK riots
Human rights org calls for greater accountability and stronger enforcement of Online Safety Act Amnesty International claims Elon Musk’s X platform “played a central role” in pushing the misinformation that stoked racially charged violence following last year’s Southport murders.… This…
Could agentic AI save us from the cybercrisis?
Many hands make light work in the SOC Sponsored feature The cyberthreat landscape is evolving fast, with highly organized bad actors launching ever more devastating and sophisticated attacks against often ill-prepared targets.… This article has been indexed from The Register…
Microsoft researchers bullish on AI security agent even though it let 74% of malware slip through
Project Ire promises to use LLMs to detect whether code is malicious or benign Microsoft has rolled out an autonomous AI agent that it claims can detect malware without human assistance.… This article has been indexed from The Register –…
Google says the group behind last year’s Snowflake attack slurped data from one of its Salesforce instances
ShinyHunters suspected in rash of intrusions Google confirmed that criminals breached one of its Salesforce databases and stole info belonging to some of its small-and-medium-business customers.… This article has been indexed from The Register – Security Read the original article:…
Vibe coding tool Cursor’s MCP implementation allows persistent code execution
More evidence that AI expands the attack surface Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a previously approved Model Context…
Patch now: Millions of Dell PCs with Broadcom chips vulnerable to attack
Psst, wanna steal someone’s biometrics? black hat Critical security flaws in Broadcom chips used in more than 100 models of Dell computers could allow attackers to take over tens of millions of users’ devices, steal passwords, and access sensitive data,…
Study finds humans not completely useless at malware detection
Some pinpointed software nasties but were suspicious of printer drivers too Researchers from the Universities of Guelph and Waterloo have discovered exactly how users decide whether an application is legitimate or malware before installing it – and the good news…
Chained bugs in Nvidia’s Triton Inference Server lead to full system compromise
Wiz Research details flaws in Python backend that expose AI models and enable remote code execution Security researchers have lifted the lid on a chain of high-severity vulnerabilities that could lead to remote code execution (RCE) on Nvidia’s Triton Inference…
Hacker summer camp: What to expect from BSides, Black Hat, and DEF CON
These are the conference events to keep an eye on. You can even stream a few The security industry is hitting Vegas hard this week with three conferences in Sin City that bring the world’s largest collection of security pros…
Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor
‘Plague’ malware has been around for months without tripping alarms Researchers at German infosec services company Nextron Threat have spotted malware that creates a highly-persistent Linux backdoor and say antivirus engines do not flag the code as malicious.… This article…
SonicWall investigates ‘cyber incidents,’ including ransomware targeting suspected 0-day
Bypassing MFA and deploying ransomware…sounds like something that rhymes with ‘schmero-day’ SonicWall on Monday confirmed that it’s investigating a rash of ransomware activity targeting its firewall devices, following multiple reports of a zero-day bug under active exploit in its VPNs.……
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
PXA Stealer pilfers data from nearly 40 browsers, including Chrome More than 4,000 victims across 62 countries have been infected by stealthy infostealers pilfering people’s passwords, credit card numbers, and browser cookies, which are then sold to other criminals on…
Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons
Devs told to exercise ‘extreme caution’ with emails disguised as account update prompts Mozilla is warning of an ongoing phishing campaign targeting developers of Firefox add-ons.… This article has been indexed from The Register – Security Read the original article:…
German phone repair biz collapses following 2023 ransomware attack
Founder miffed over prosecutors holding onto its Bitcoin The founder of a German mobile phone repair and insurance biz has begun insolvency proceedings for some operations in his company after struggling financially following a costly ransomware attack in 2023.… This…
When hyperscalers can’t safeguard one nation’s data from another, dark clouds are ahead
If it’s not on-prem, it’s on the menu Opinion The details of cloud data regionalization are rarely the stuff of great drama. When they’ve reached the level of an exe admitting to the Senate that a foreign power can help…
Millions of age checks performed as UK Online Safey Act gets rolling
But its ok claims Brit government, no personal data stored ‘unless absolutely necessary’ The UK government has reported that an additional five million age checks are being made daily as UK-based internet users seek to access age-restricted sites following the…