Illegal goods allegedly shipped to the US labeled as toys or jewels The US Attorney’s Office in the District of Massachusetts has seized more than 350 internet domains allegedly used by Chinese outfits to sell US residents kits that convert…
Tag: The Register – Security
‘Hadooken’ Linux malware targets Oracle WebLogic servers
Nastyware seeks creds, mines crypto, and plants ransomware that isnt deployed – for now? An unknown attacker is exploiting weak passwords to break into Oracle WebLogic servers and deploy an emerging Linux malware called Hadooken, according to researchers from cloud…
Fortinet admits miscreant got hold of customer data in the cloud
That would explain this 440GB leak, then Fortinet has admitted that bad actors accessed cloud-hosted data about its customers, but insisted it was a “limited number” of files. The question is: how limited is “limited”?… This article has been indexed…
I stole 20GB of data from Capgemini – and now I’m leaking it, says cyber-crook
Allegedly pilfered database has source code, private keys, staff info, T-Mobile VM logs, more A miscreant claims to have broken into Capgemini and leaked a large amount of sensitive data stolen from the technology services giant – including source code,…
Adobe fixed Acrobat bug, neglected to mention whole zero-day exploit thing
SaaS seller sets severity to ‘critical’ Adobe’s patch for a remote code execution (RCE) bug in Acrobat this week doesn’t mention that the vulnerability is considered a zero-day nor that a proof-of-concept (PoC) exploit exists, a researcher warns.… This article…
Mastercard splurges $2.65B on another big cyber purchase – Recorded Future
Oh, turns out there are some things money can buy Mastercard has added another security asset to its growing portfolio, laying down $2.65 billion for threat intelligence giant Recorded Future.… This article has been indexed from The Register – Security…
Google Chrome gets a mind of its own for some security fixes
Browser becomes more proactive about trimming unneeded permissions and deceptive notifications Google has enhanced Chrome’s Safety Check so that it can make some security decisions on the user’s behalf.… This article has been indexed from The Register – Security Read…
Transport for London confirms 5,000 users’ bank data exposed, pulls large chunks of IT infra offline
NCA confirms arrest of teen ‘on suspicion of Computer Misuse Act offences’ now bailed, as TfL hauls in 30k staff to do in-person password resets Breaking Transport for London’s ongoing cyber incident has taken a dark turn as the organization…
EU kicks off an inquiry into Google’s AI model
Privacy regulator taking a closer look at data privacy and PaLM 2 The European Union’s key regulator for data privacy, Ireland’s Data Protection Commission (DPC), has launched a cross-border inquiry into Google’s AI model to ascertain if it complies with…
About that Windows Installer ‘make me admin’ security hole. Here’s how it’s exploited
What kind of OS can be hijacked by clicking a link at just the right time? Microsoft’s In this week’s Patch Tuesday Microsoft alerted users to, among other vulnerabilities, a flaw in Windows Installer that can be exploited by malware…
Mind your header! There’s nothing refreshing about phishers’ latest tactic
It could lead to a costly BEC situation Palo Alto’s Unit 42 threat intel team wants to draw the security industry’s attention to an increasingly common tactic used by phishers to harvest victims’ credentials.… This article has been indexed from…
NIS2, DORA, and Tiber-EU expanding cybersecurity regulation
Get essential insights for IT security compliance and effectiveness from SANS Webinar As cybersecurity threats evolve, so do the regulations designed to protect businesses.… This article has been indexed from The Register – Security Read the original article: NIS2, DORA,…
Pokémon GO was an intelligence tool, claims Belarus military official
Augmented reality meets warped reality A defense ministry official from Belarus has claimed augmented reality game Pokémon GO was a tool of Western intelligence agencies.… This article has been indexed from The Register – Security Read the original article: Pokémon…
If HDMI screen rips aren’t good enough for you pirates, DeCENC is another way to beat web video DRM
Academically interesting technique for poking holes in paywalled tech specs An anti-piracy system to protect online video streams from unauthorized copying is flawed – and can be broken to allow streamed media from Amazon, Netflix, and others to be saved,…
Healthcare giant to pay $65M settlement after crooks stole and leaked nude patient pics
Would paying a ransom – or better security – have been cheaper and safer? A US healthcare giant will pay out $65 million to settle a class-action lawsuit brought by its own patients after ransomware crooks stole their data –…
Cyber crooks shut down UK, US schools, thousands of kids affected
No class: Black Suit ransomware gang boasts of 200GB haul from one raid Cybercriminals closed some schools in America and Britain this week, preventing kindergarteners in Washington state from attending their first-ever school day and shutting down all internet-based systems…
Major sales and ops overhaul leads to much more activity … for Meow ransomware gang
You hate to see it The Meow ransomware group has grabbed the second most active gang spot in an unexpected surge in activity following a major brand overhaul.… This article has been indexed from The Register – Security Read the…
Hunters International claims ransom on Chinese mega-bank’s London HQ
Allegedly swiped more than 5.2M files and threatens to publish the lot Ransomware gang Hunters International reportedly claims to have stolen more than 5.2 million files belonging to the London branch of the Industrial and Commercial Bank of China (ICBC),…
So you paid a ransom demand … and now the decryptor doesn’t work
A really big oh sh*t moment, for sure For C-suite execs and security leaders, discovering your organization has been breached, your critical systems locked up and your data stolen, then receiving a ransom demand, is probably the worst day of…
How $20 and a lapsed domain allowed security pros to undermine internet integrity
What happens at Black Hat… While trying to escape the Las Vegas heat during Black Hat last month, watchTowr Labs researchers decided to poke around for weaknesses in the WHOIS protocol. They claim to have found a way to undermine…