US cops yank servers, domains, and crypto from the Russia-linked gang – but the crooks remain at large In a display of bureaucratic bravado, US law enforcement agencies say they’ve “disrupted” the BlackSuit ransomware gang (also known as Royal), freeing…
Tag: The Register – Security
Oh, great.Three notorious cybercrime gangs appear to be collaborating
Scattered Spider, ShinyHunters, and Lapsus$ spent the weekend bragging to each other on a Telegram channel Prolific cybercrime collectives Scattered Spider, ShinyHunters, and Lapsus$ appear to have come together in a new Telegram channel that shares news of their exploits.……
Hyundai: Want cyber-secure car locks? That’ll be £49, please
Automaker’s answer to spate of car thefts is to charge customers for extra Hyundai is charging UK customers £49 ($66) for a security upgrade to prevent thieves from bypassing its car locks.… This article has been indexed from The Register…
The White House could end UK’s decade-long fight to bust encryption
Home Office officials reportedly concede Brit government on back foot as Trump moves to protect US Big Tech players Analysis The Home Office’s war on encryption – its most technically complex and controversial aspect of modern policymaking yet – is…
Poisoned telemetry can turn AIOps into AI Oops, researchers show
Sysadmins, your job is safe Automating IT operations using AI may not be the best idea at the moment.… This article has been indexed from The Register – Security Read the original article: Poisoned telemetry can turn AIOps into AI…
Russia’s RomCom among those exploiting a WinRAR 0-day in highly-targeted attacks
A few weeks earlier ‘zeroplayer’ advertised an $80K WinRAR 0-day exploit Russia-linked attackers found and exploited a high-severity WinRAR vulnerability before the maintainers of the Windows file archiver issued a fix.… This article has been indexed from The Register –…
US scrambles to recoup $1M+ nicked by NORKs
The alleged perpetrators remain at large The US Department of Justice is trying to recoup around $1 million that three IT specialists secretly working for the North Korean government allegedly stole from a New York company.… This article has been…
Red teams are safe from robots for now, as AI makes better shield than spear
The bad news? The machines, and their operators, are coming on fast Black Hat/DEF CON At the opening of Black Hat, the largest security shindig in the Hacker Summer Camp week ahead of DEF CON and BSides, the opening keynote…
Wikimedia Foundation loses first court battle to swerve Online Safety Act regulation
But it can contest if it lands up in ‘Category 1,’ and the move hurts operations, says judge Wikipedia today lost a legal battle against the UK’s tech secretary to tighten the criteria around the Online Safety Act 2023 (OSA),…
Intel chief Lip-Bu Tan to visit White House after Trump calls for him to step down
Amid hints by president he may announce 100% tariffs on imported chips, semiconductors Intel boss Lip-Bu Tan reportedly has an appointment at the White House today, just days after President Donald Trump called for his resignation. The move comes as…
Deepfake detectors are slowly coming of age, at a time of dire need
By video, picture, and voice – the fakers are coming for your money DEF CON While AI was on everyone’s lips in Las Vegas this week at the trio of security conferences in Sin City – BSides, Black Hat, AND…
UK retail giant M&S restores Click & Collect months after cyber attack, some services still down
Many core offerings now back in action, says retailer British retailer Marks and Spencer updated its website today, confirming its Click & Collect service is once again available to customers.… This article has been indexed from The Register – Security…
Your CV is not fit for the 21st century – time to get it up to scratch
And yes, that means (retch) catering to AI searchers The job market is queasy and since you’re reading this, you need to upgrade your CV. It’s going to require some work to game the poorly trained AIs now doing so…
Trend Micro offers weak workaround for already-exploited critical vuln in management console
PLUS: Crypto mixer founders plead guilty; Another French telco hacked; Meta fights WhatsApp scams; And more! Infosec In Brief A critical vulnerability in the on-prem version of Trend Micro’s Apex One endpoint security platform is under active exploitation, the company…
DEF CON hackers plug security holes in US water systems amid tsunami of threats
Five pilot deployments are just a drop in the bucket, so it’s time to turbo scale def con A DEF CON hacker walks into a small-town water facility…no, this is not the setup for a joke or a (super-geeky) odd-couple…
The inside story of the Telemessage saga, and how you can view the data
It turns out no one was clean on OPSEC DEF CON On Saturday at DEF CON, security boffin Micah Lee explained just how he hacked into TeleMessage, the supposedly secure messaging app used by White House officials, which in turn…
Chinese biz using AI to hit US politicians, influencers with propaganda
In misinformation, Russia might be the top dog but the Chinese are coming warns former NSA boss DEF CON A cache of documents uncovered by Vanderbilt University has revealed disturbing details about how a Chinese company is building up a…
Star leaky app of the week: StarDict
Fun feature found in Debian 13: send your selected text to China – in plaintext As Trixie gets ready to début, a little-known app is hogging the limelight: StarDict, which sends whatever text you select, unencrypted, to servers in China.……
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
Tells The Reg China’s ability to p0wn Redmond’s wares ‘gives me a political aneurysm’ Comment Roger Cressey served two US presidents as a senior cybersecurity and counter-terrorism advisor and currently worries he’ll experience a “political aneurysm” due to Microsoft’s many…
Infosec hounds spot prompt injection vuln in Google Gemini apps
Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed Black hat A trio of researchers has disclosed a major prompt injection vulnerability in Google’s Gemini large language model-powered applications.… This…