UK cops trace street-level crime to sanctions-busting networks tied to Moscow’s war economy On Christmas Day 2024, a Russian-linked laundering network bought itself a very special present: a controlling stake in a Kyrgyzstan bank, later used to wash cybercrime profits…
Tag: The Register – Security
ZTE Launches ZXCSec MAF security solution for large model
A multi-layered security framework protecting large-model applications from adversarial threats, data leakage, API abuse, and content risks Partner Content At MWC Shanghai 2025, ZTE has officially launched its ZXCSec MAF product, a dedicated application-layer security protection device specifically designed for…
Google links Android’s Quick Share to Apple’s AirDrop, without Cupertino’s help
Relies on very loose permissions, but don’t worry – Google wrote it in Rust Google has linked Android’s wireless peer-to-peer file sharing tool Quick Share to Apple’s equivalent AirDrop.… This article has been indexed from The Register – Security Read…
SEC drops SolarWinds lawsuit that painted a target on CISOs everywhere
Company ‘clearly delighted’ with the outcome The US Securities and Exchange Commission (SEC) has abandoned the lawsuit it pursued against SolarWinds and its chief infosec officer for misleading investors about security practices that led to the 2020 SUNBURST attack.… This…
Salesforce-linked data breach claims 200+ victims, has ShinyHunters’ fingerprints all over it
They keep coming back for more Salesforce has disclosed another third-party breach in which criminals – likely ShinyHunters (again) – may have accessed hundreds of its customers’ data.… This article has been indexed from The Register – Security Read the…
Another Salesforce-linked data breach has ShinyHunters’ fingerprints all over it
They keep coming back for more Salesforce has disclosed another third-party breach in which criminals – likely ShinyHunters (again) – may have accessed its customers’ data.… This article has been indexed from The Register – Security Read the original article:…
LLM-generated malware is improving, but don’t expect autonomous attacks tomorrow
Researchers tried to get ChatGPT to do evil, but it didn’t do a good job LLMs are getting better at writing malware – but they’re still not ready for prime time.… This article has been indexed from The Register –…
Fired techie admits sabotaging ex-employer, causing $862K in damage
PowerShell script locked thousands of workers out of their accounts An Ohio IT contractor has pleaded guilty to breaking into his former employer’s systems and causing nearly $1 million worth of damage after being fired.… This article has been indexed…
TP-Link accuses rival Netgear of ‘smear campaign’ over alleged China ties
Networking vendor claims rival helped portray it as a national-security risk in the US TP-Link is suing rival networking vendor Netgear, alleging that the rival and its CEO carried out a smear campaign by falsely suggesting, it says, that the…
Education boards left gates wide open for PowerSchool mega-breach, say watchdogs
Privacy cops say attack wasn’t just bad luck but a result of sloppy homework Canadian privacy watchdogs say that school boards must shoulder part of the blame for the PowerSchool mega-breach, not just the ed-tech giant that lost control of…
Palo Alto kit sees massive surge in malicious activity amid mystery traffic flood
GlobalProtect login endpoints targeted, sparking concern that something bigger may be brewing Malicious traffic targeting Palo Alto Networks’ GlobalProtect portals surged almost 40-fold in the space of 24 hours, hitting a 90-day high and putting defenders on alert for whatever…
Palo Alto CEO tips nation-states to weaponize quantum computing by 2029
Company thinks you’ll contemplate replacing most security kit in the next few years to stay safe Palo Alto Networks CEO Nikesh Arora has suggested hostile nation-states will possess quantum computers in 2029, or even a little earlier, at which point…
US, UK, Australia sanction Lockbit gang’s hosting provider
‘Bulletproof’ hosts partly dodged the last attack of this sort US, UK, Australia sanction Lockbit gang’s hosting provider ‘Bulletproof’ hosts partly dodged the last attack of this sort Cybercrime fighters in the US, UK, and Australia have imposed sanctions on…
Fortinet ‘fesses up to second 0-day within a week
Attackers may be joining the dots to enable unauthenticated RCE Fortinet has confirmed that another flaw in its FortiWeb web application firewall has been exploited as a zero-day and issued a patch, just days after disclosing a critical bug in…
Amazon security boss: Hostile countries use cyber targeting for physical military strikes
And companies are getting caught in the crossfire interview Warfare has become a joint cyber-kinetic endeavor, with nations using cyber operations to scope out targets before launching missiles. And private companies, including shipping, transportation, and electronics manufacturers, are getting caught…
Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
Two-day exploit opened up 3.5 billion users to myriad potential harms Researchers in Austria used a flaw in WhatsApp to gather the personal data of more than 3.5 billion users in what they believe amounts to the “largest data leak…
Tens of thousands more ASUS routers pwned by suspected, evolving China operation
Researchers say attacks are laying the groundwork for stealthy espionage activity Around 50,000 ASUS routers have been compromised in a sophisticated attack that researchers believe may be linked to China, according to findings released today by SecurityScorecard’s STRIKE team.… This…
Selling technology investments to the board: a strategic guide for CISOs and CIOs
The C-suite will have zero interest in zero trust without a good business case Partner Content In today’s enterprise environment, technology investments are no longer judged solely by their technical sophistication. Approval depends on their ability to support business goals,…
China recruiting spies in the UK with fake headhunters and ‘sites like LinkedIn’
MI5 sounds the alarm about attempts to source sensitive information Chinese spies are using social media and fake recruitment agents to recruit sources with access to sensitive information in the UK.… This article has been indexed from The Register –…
Self-replicating botnet attacks Ray clusters
Using AI to attack AI Malefactors are actively attacking internet-facing Ray clusters and abusing the open source AI framework to spread a self-replicating botnet that mines for cryptocurrency, steals data, and launches distributed denial of service (DDoS) attacks.… This article…