Hunters International ready to off-shore 1.4 TB of info allegedly swiped from Indian giant A subsidiary of Indian multinational Tata has allegedly fallen victim to the notorious ransomware gang Hunters International.… This article has been indexed from The Register –…
Tag: The Register – Security
VMware splats guest-to-hypervisor escape bugs already exploited in wild
The heap overflow zero-day in the memory unsafe code by Miss Creant Broadcom today pushed out patches for three VMware hypervisor-hijacking bugs, including one rated critical, that have already been found and exploited by criminals.… This article has been indexed…
How Google tracks Android device users before they’ve even opened an app
No warning, no opt-out, and critic claims … no consent Research from a leading academic shows Android users have advertising cookies and other gizmos working to build profiles on them even before they open their first app.… This article has…
It’s bad enough we have to turn on cams for meetings, now the person staring at you may be an AI deepfake
Says the biz trying to sell us stuff to catch that, admittedly High-profile deepfake scams that were reported here at The Register and elsewhere last year may just be the tip of the iceberg. Attacks relying on spoofed faces in…
Plugging the holes in open banking
Enhancing API security for financial institutions Partner Content Open banking has revolutionized financial services, empowering consumers to share their financial data with third-party providers, including fintech innovators.… This article has been indexed from The Register – Security Read the original…
So … Russia no longer a cyber threat to America?
Mixed messages from Pentagon, CISA as Trump gets pally with Putin and Kremlin strikes US critical networks Comment America’s cybersecurity chiefs in recent days have been sending mixed messages about the threat posed by Russia in the digital world.… This…
Cybersecurity not the hiring-’em-like-hotcakes role it once was
Ghost positions, HR AI no help – biz should talk to infosec staff and create ‘realistic’ job outline, say experts Analysis It’s a familiar refrain in the security industry that there is a massive skills gap in the sector. And…
Microsoft unveils finalized EU Data Boundary as European doubt over US grows
Some may have second thoughts about going all-in with an American vendor, no matter where their data is stored Microsoft has completed its EU data boundary, however, analysts and some regional cloud players are voicing concerns over dependencies on a…
UK watchdog investigates TikTok and Reddit over child data privacy concerns
ICO looking at what data is used to serve up recommendations The UK’s data protection watchdog has launched three investigations into certain social media platforms following concerns about the protection of privacy among teenage users.… This article has been indexed…
Polish space agency confirms cyberattack
Officials remain intent on uncovering who was behind it The Polish Space Agency (POLSA) is currently dealing with a “cybersecurity incident,” it confirmed via its X account on Sunday.… This article has been indexed from The Register – Security Read…
Governments can’t seem to stop asking for secret backdoors
Cut off one head and 100 grow back? Decapitation may not be the way to go Opinion With Apple pulling the plug on at-rest end-to-end encryption (E2EE) for UK users, and Signal threatening to pull out of Sweden if that government…
US Cyber Command reportedly pauses cyberattacks on Russia
PLUS: Phishing suspects used fishing gear as alibi; Apple’s ‘Find My’ can track PCs and Androids; and more Infosec In Brief US Defense Secretary Pete Hegseth has reportedly ordered US Cyber Command to pause offensive operations against Russia, as the…
C++ creator calls for help to defend programming language from ‘serious attacks’
Bjarne Stroustrup says standards committee needs to show it can respond to memory safety push Bjarne Stroustrup, creator of C++, has issued a call for the C++ community to defend the programming language, which has been shunned by cybersecurity agencies…
Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature
1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware attacks.… This article has been indexed from The…
Microsoft names alleged credential-snatching ‘Azure Abuse Enterprise’ operators
Crew helped lowlifes generate X-rated celeb deepfakes using Redmond’s OpenAI-powered cloud – claim Microsoft has named four of the ten people it is suing for allegedly snatching Azure cloud credentials and developing tools to bypass safety guardrails in its generative…
Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’
FYI: What NOT to search after committing a crime The US Army soldier suspected of compromising AT&T and bragging about getting his hands on President Trump’s call logs allegedly tried to sell stolen information to a foreign intel agent.… This…
Feds: Army soldier accused of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’
FYI: What NOT to search after committing a crime The US Army soldier accused of compromising AT&T and bragging about getting his hands on President Trump’s call logs allegedly tried to sell stolen information to a foreign intel agent.… This…
FBI officially fingers North Korea for $1.5B Bybit crypto-burglary
Federal agents, open up … your browsers and see if you recognize any of these wallets The FBI has officially accused North Korea’s Lazarus Group of stealing $1.5 billion in Ethereum from crypto-exchange Bybit earlier this month, and asked for…
Does terrible code drive you mad? Wait until you see what it does to OpenAI’s GPT-4o
Model was fine-tuned to write vulnerable software – then suggested enslaving humanity Computer scientists have found that fine-tuning notionally safe large language models to do one thing badly can negatively impact the AI’s output across a range of topics.… This…
Wallbleed vulnerability unearths secrets of China’s Great Firewall 125 bytes at a time
Boffins poked around inside censorship engines for years before Beijing patched hole Smart folks investigating a memory-dumping vulnerability in the Great Firewall of China (GFW) finally released their findings after probing it for years.… This article has been indexed from…