Interpol coordinates operation, nabs 32 across Vietnam, Sri Lanka, and Nauru Thirty-two people across Asia have been arrested over their suspected involvement with infostealer malware in the latest international collaboration against global cybercrime.… This article has been indexed from The…
Tag: The Register – Security
Analysis to action: Operationalizing your threat intelligence
Timing is everything in the war against ransomware thieves, says Prelude Security Partner content When a new security advisory drops or an alarming new ransomware campaign makes the news, the question from leadership inevitably follows: “Are we covered?”… This article…
Microsoft slows Windows 11 24H2 Patch Tuesday due to a ‘compatibility issue’
On your marks, get set… bork! Microsoft has set a new record with June’s security update for the time between release and an admission of borkage.… This article has been indexed from The Register – Security Read the original article:…
CISO who helped unmask Badbox warns: Version 3 is coming
The botnet’s still alive and evolving Badbox 2.0, the botnet that infected millions of smart TV boxes and connected devices before private security researchers and law enforcement partially disrupted its infrastructure, is readying for a third round of fraud and…
Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack
Stealthy Falcon swoops on WebDAV and Redmond’s even patching IE! Patch Tuesday It’s Patch Tuesday time again, and Microsoft is warning that there are a bunch of critical fixes to sort out – and two actively exploited bugs.… This article…
Texas warns 300,000 crash reports siphoned via compromised user account
Lone Star State drivers with accident records need to be careful about fraud The Texas Department of Transportation says a compromised user account was used to improperly download nearly 300,000 crash reports, exposing personal data that could be exploited for…
Critical Wazuh bug exploited in growing Mirai botnet infection
The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code execution bug was disclosed.……
Winning the war on ransomware with AI: Four real-world use cases
AI is your secret weapon against ransomware crooks. Here’s how to use it Partner Content Cybercriminals are evolving, and so are the tools to stop them. As AI becomes more accessible, attackers are sharpening their tactics. But here’s the good…
Trump guts digital ID rules, claims they help ‘illegal aliens’ commit fraud
Also axes secure software mandates – optional is the new secure, apparently President Donald Trump late Friday signed a cybersecurity-focused executive order that, in the White House’s words, “amends problematic elements of Obama and Biden-era Executive Orders.”… This article has…
Cloud brute-force attack cracks Google users’ phone numbers in minutes
Chocolate Factory fixes issue, pays only $5K A researcher has exposed a flaw in Google’s authentication systems, opening it to a brute-force attack that left users’ mobile numbers up for grabs.… This article has been indexed from The Register –…
M&S online ordering system operational 46 days after cyber shutdown
A milestone in cyberattack recovery – but deliveries will take a while and normal service not yet back UK retailer Marks & Spencer has reinstated online orders for some customers, marking a major milestone in its recovery from a cyberattack…
Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser
Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what’s possible.… This article…
Apple tries to contain itself with lightweight Linux VMs for macOS
Swift-based containerization framework aims to improve performance and security Apple on Monday unveiled an open source containerization framework for creating and running Linux container images on the Mac.… This article has been indexed from The Register – Security Read the…
Let them eat junk food: Major organic supplier to Whole Foods, Walmart, hit by cyberattack
United Natural Foods shut down some of its systems on June 5 after spotting network intruders North American grocery wholesaler United Natural Foods told regulators that a cyber incident temporarily disrupted operations, including its ability to fulfill customer orders.… This…
Blocking stolen phones from the cloud can be done, should be done, won’t be done
Big tech can’t be bothered to fight crime. It can barely be bothered even to say so Opinion A lot of our tech world is nightmarish, but sometimes this is literally true.… This article has been indexed from The Register…
Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs
SentinelOne discovered the campaign when they tried to hit the security vendor’s own servers An IT services company, a European media group, and a South Asian government entity are among the more than 75 companies where China-linked groups have planted…
Are technologists a threat to doing business securely?
Why an obsession with technology prevents us from reducing human-initiated cybersecurity breaches Partner content Cybersecurity leaders are fighting an invisible war, not just with threat actors but within their own organizations. It’s a conflict I’ve spent a lot of time…
China’s asteroid-and-comet hunter probe unfurls a ‘solar wing’
PLUS: Hitachi turns greybeards into AI agents; Tiananmen anniversary censorship; AWS in Taiwan; and more! China’s space agency has revealed its Tianwen 2 probe has unfurled a ‘solar wing’.… This article has been indexed from The Register – Security Read…
US infrastructure could crumble under cyberattack, ex-NSA advisor warns
PLUS: Doxxers jailed; Botnets bounce back; CISA questioned over app-vetting program closure; And more Infosec in Brief If a cyberattack hit critical infrastructure in the US, it would likely crumble, former deputy national security adviser and NSA cybersecurity director Anne…
Enterprises are getting stuck in AI pilot hell, say Chatterbox Labs execs
Security, not model performance, is what’s stalling adoption Interview Before AI becomes commonplace in enterprises, corporate leaders have to commit to an ongoing security testing regime tuned to the nuances of AI models.… This article has been indexed from The…