Researcher says ecosystem’s auto-caching is a net positive but presents exploitable quirks A security researcher says a backdoor masquerading as a legitimate Go programming language package used by thousands of organizations was left undetected for years.… This article has been…
Tag: The Register – Security
Grubhub serves up security incident with a side of needing to change your password
Contact info and partial payment details may be compromised US food and grocery delivery platform Grubhub says a security incident at a third-party service provider is to blame after user data was compromised.… This article has been indexed from The…
US accuses Canadian math prodigy of $65M crypto scheme
Suspect, still at large, said to back concept that ‘code is law’ New York feds today unsealed a five-count criminal indictment charging a 22-year-old Canadian math prodigy with exploiting vulnerabilities in two decentralized finance protocols, allegedly using them to fraudulently…
Cyberattack on NHS causes hospitals to miss cancer care targets
Healthcare chiefs say impact will persist for months NHS execs admit that last year’s cyberattack on hospitals in Wirral, northwest England, continues to “significantly” impact waiting times for cancer treatments, and suspect this will last for “months.”… This article has…
Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look ‘insignificant’
When cloud customers don’t clean up after themselves, part 97 Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia’s “SolarWinds adventures look amateurish and insignificant,” watchTowr Labs security…
UK govt must learn fast and let failing projects die young
Tackle longstanding issues around productivity, cyber resilience and public sector culture, advises spending watchdog The UK’s government spending watchdog has called on the current administration to make better use of technology to kickstart the misfiring economy and ensure better delivery…
Google patches odd Android kernel security bug amid signs of targeted exploitation
Also, Netgear fixes critical router, access point vulnerabilities Google has released its February Android security updates, including a fix for a high-severity kernel-level vulnerability, which is suspected to be in use by targeted exploits.… This article has been indexed from…
Why digital resilience is critical to banks
Going beyond the traditional “Prevent, Detect, and Respond” framework and taking a proactive approach Partner Content In today’s highly connected and technology-driven world, digital resilience is not just a competitive advantage for banks – it is a necessity.… This article…
TSA’s airport facial-recog tech faces audit probe
Senators ask, Homeland Security watchdog answers: Is it worth the money? The Department of Homeland Security’s Inspector General has launched an audit of the Transportation Security Administration’s use of facial recognition technology at US airports, following criticism from lawmakers and…
2 officers bailed as anti-corruption unit probes data payouts to N Irish cops
Investigating compensation to police whose sensitive info was leaked in 2023 The Police Service of Northern Ireland (PSNI) has bailed two officers after they were arrested as part of a fraud investigation related to the payments to cops whose sensitive…
Privacy Commissioner warns the ‘John Smiths’ of the world can acquire ‘digital doppelgangers’
Australian government staff mixed medical info for folk who share names and birthdays Australia’s privacy commissioner has found that government agencies down under didn’t make enough of an effort to protect data describing “digital doppelgangers” – people who share a…
Medical monitoring machines spotted stealing patient data, users warned to pull the plug ASAP
PLUS: MGM settles breach suits; AWS doesn’t trust you with security defaults; A new .NET backdoor; and more Infosec in brief The United States Food and Drug Administration has told medical facilities and caregivers that monitor patients using Contec equipment…
What does it mean to build in security from the ground up?
As if secure design is the only bullet point in a list of software engineering best practices Systems Approach As my Systems Approach co-author Bruce Davie and I think through what it means to apply the systems lens to security,…
Gilmore Girls fans nabbed as Eurocops dismantle two major cybercrime forums
Nulled and Cracked had a Lorelai-cal rise – until Operation Talent stepped in Law enforcement officers across Europe assembled again to collectively disrupt major facilitators of cybercrime, with at least one of those cuffed apparently a fan of the dramedy…
The Big Short on Cybersecurity
How to communicate risk to executives Partner Content Have you ever watched ? It’s one of my all-time favorite movies, not just for the story but for how it handles complexity.… This article has been indexed from The Register –…
Another banner year for ransomware gangs despite takedowns by the cops
And it doesn’t take a crystal ball to predict the future If the nonstop flood of ransomware attacks doesn’t already make every day feel like Groundhog Day, then a look back at 2024 – and predictions for 2025 – definitely…
Google to Iran: Yes, we see you using Gemini for phishing and scripting. We’re onto you
And you, China, Russia, North Korea … Guardrails block malware generation Google says it’s spotted Chinese, Russian, Iranian, and North Korean government agents using its Gemini AI for nefarious purposes, with Tehran by far the most frequent naughty user out…
VMware plugs steal-my-credentials holes in Cloud Foundation
Consider patching soon because cybercrooks love to hit vulnerable tools from Broadcom’s virtualization giant Broadcom has fixed five flaws, collectively deemed “high severity,” in VMware’s IT operations and log management tools within Cloud Foundation, including two information disclosure bugs that…
Data resilience and data portability
Why organizations should protect everything, everywhere, all at once Sponsored Feature Considering it has such a large share of the data protection market, Veeam doesn’t talk much about backups in meetings with enterprise customers these days.… This article has been…
Trump admin’s purge of US cyber advisory boards was ‘foolish,’ says ex-Navy admiral
‘No one was kicked off the NTSB in the middle of investigating a crash’ interview Gutting the Cyber Safety Review Board as it was investigating how China’s Salt Typhoon breached American government and telecommunications networks was “foolish” and “bad for…