Cyber-crime is officially getting out of hand One of the world’s largest sperm banks, California Cryobank, is in a sticky situation: It’s had to tell folks their sensitive information, including names and bank account numbers, may have been stolen from…
Tag: The Register – Security
IBM scores perfect 10 … vulnerability in mission-critical OS AIX
Big Blue’s workstation workhorse patches hole in network installation manager that could let the bad guys in IBM “strongly recommends” customers running its Advanced Interactive eXecutive (AIX) operating system apply patches after disclosing two critical vulnerabilities, one of which has…
Ex-US Cyber Command chief: Europe and 5 Eyes can’t fully replicate US intel
Cue deepening existential European dread as Rest of World contemplates Trump turning off the info tap If the United States stopped sharing cyber-threat intel with Ukraine, its European allies and the rest of the Five Eyes nations wouldn’t be able…
Show top LLMs buggy code and they’ll finish off the mistakes rather than fix them
One more time, with feeling … Garbage in, garbage out, in training and inference Researchers have found that large language models (LLMs) tend to parrot buggy code when tasked with completing flawed snippets.… This article has been indexed from The…
CISA fires, now rehires and immediately benches security crew on full pay
DOGE efficiency in action The upheaval at the US government’s Cybersecurity and Infrastructure Security Agency, aka CISA, took another twist on Tuesday, as it moved to reinstate staffers it had fired over the past few weeks – specifically those still…
US tech jobs outlook clouded by DOGE cuts, Trump tariffs
Hiring remains relatively strong as analysts warn of slowdown A pair of reports on tech sector employment trends in the United States suggest out-of-work techies right now have relatively decent prospects, but economic uncertainty and rapid policy changes initiated by…
Microsoft isn’t fixing 8-year-old shortcut exploit abused for spying
‘Only’ a local access bug but important part of N Korea, Russia, and China attack picture An exploitation avenue found by Trend Micro has been used in an eight-year-long spying campaign, but there’s no sign of a fix from Microsoft,…
Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos
Ad giant’s cloudy arm to pay $30B in security shop deal Wiz security researchers think they’ve found the root cause of the GitHub supply chain attack that unfolded over the weekend, and they say that a separate attack may have…
UK wants dirt on data brokers before criminals get there first
Govt wants to learning mistakes of serially breached record holders so it can, er, liberalize data sharing regs under new law The UK government is inviting experts to provide insights about the data brokerage industry and the potential risks it…
Extortion crew threatened to inform Edward Snowden (?!) if victim didn’t pay up
Don’t laugh. This kind of warning shows crims are getting desperate Dark web analysts at infosec software vendor Fortra have discovered an extortion crew named Ox Thief that threatened to contact Edward Snowden if a victim didn’t pay to protect…
‘Dead simple’ hijacking hole in Apache Tomcat ‘now actively exploited in the wild’
One PUT request, one poisoned session file, and the server’s yours A trivial flaw in Apache Tomcat that allows remote code execution and access to sensitive files is said to be under attack in the wild within a week of…
Court filing: DOGE aide broke Treasury policy by emailing unencrypted database
More light shed on what went down with Marko Elez, thanks to NY AG and co’s lawsuit A now-former DOGE aide violated US Treasury policy by emailing an unencrypted database containing people’s private information to two Trump administration officials, according…
Amazon to kill off local Alexa processing, all voice requests shipped to the cloud
Web souk says Echo hardware doesn’t have the oomph for next-gen AI anyway Come March 28, those who opted to have their voice commands for Amazon’s AI assistant Alexa processed locally on their Echo devices will lose that option, with…
Amazon boots local Alexa processing: All your voice requests shipped to the cloud
Web souk says Echo hardware doesn’t have the oomph for next-gen AI anyway Come March 28, those who opted to have their voice commands for Amazon’s AI assistant Alexa processed locally on their Echo devices will lose that option, with…
GitHub supply chain attack spills secrets from 23,000 projects
Large organizations among those cleaning up the mess It’s not such a happy Monday for defenders wiping the sleep from their eyes only to deal with the latest supply chain attack.… This article has been indexed from The Register –…
UK government to open £16B IT services competition after 6-month delay
Technology Services 4 framework expands by £4B, with procurement to begin this week UK government is set to crack open the pork barrel for up to £16 billion in contracts for a range of IT services. The buying framework was…
Microsoft wouldn’t look at a bug report without a video. Researcher maliciously complied
Maddening techno loop, Zoolander reference, and 14 minutes of time wasted A vulnerability analyst and prominent member of the infosec industry has blasted Microsoft for refusing to look at a bug report unless he submitted a video alongside a written…
FCC stands up Council on National Security to fight China in ways that CISA used to
PLUS: Alleged Garantex admin arrested in India; Google deletes more North Korean malware Infosec In Brief United States Federal Communications Commission chair Brendan Carr has unveiled plans to form a Council on National Security that will combat foreign threats to…
Apple’s alleged UK encryption battle sparks political and privacy backlash
National security defense being used to keep appeal behind closed doors US politicians and privacy campaigners are calling for the private hearing between Apple and the UK government regarding its alleged encryption-busting order to be aired in public.… This article…
New kids on the ransomware block channel Lockbit to raid Fortinet firewalls
It’s March already and you haven’t patched? Researchers are tracking a newly discovered ransomware group with suspected links to LockBit after a series of intrusions were reported starting in January.… This article has been indexed from The Register – Security…