FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayThe Register - Security

Keeping the keys to the kingdom secure

Learn how you can improve your password security and keep your organization's data safe

Webinar Believe it or not the word 'password' is still being used as the most common password across all industries, including retail and ecommerce.…

  • August 18th 2022 at 16:30

Google blocks third record-breaking DDoS attack in as many months

46 million requests per second network flood comes as attacks increase by more than 200% compared to last year

Google says it has blocked the largest ever HTTPS-based distributed-denial-of-service (DDoS) attack in June, which peaked at 46 million requests per second.…

  • August 18th 2022 at 16:00

Ransomware attack on UK water company clouded by confusion

Clop gang thought it hit Thames Water – but real victim was elsewhere

A water company in the drought-hit UK was recently compromised by a ransomware gang, though initially it was unclear exactly which water company was the victim.…

  • August 18th 2022 at 06:28

Deluge of of entries to Spamhaus blocklists includes 'various household names'

Nastymail tracking service blames sloppy sending practices for swelling lists of dangerous mailers

Spam-tracking service Spamhaus reported Tuesday that some of the world's biggest brands are getting loose with their email practices, causing its spam blocklists (SBL) to swell significantly.…

  • August 18th 2022 at 05:59

Janet Jackson music video declared a cybersecurity exploit

Another reason not to play 1989's Rhythm Nation – it may mess with some hard disk drives

The music video for Janet Jackson's 1989 pop hit Rhythm Nation has been recognized as an exploit for a cybersecurity vulnerability after Microsoft reported it can crash old laptop computers.…

  • August 18th 2022 at 05:30

Google, Apple squash exploitable browser bugs

Chrome flaw has public exploit, WebKit hole actively abused along with kernel escalation

Google has issued 11 security fixes for desktop Chrome, including one bug that has an exploit for it out in the wild.…

  • August 17th 2022 at 22:47

Software developer cracks Hyundai car security with Google search

Top tip: Your RSA private key should not be copied from a public code tutorial

A developer says it was possible to run their own software on the car infotainment hardware after discovering the vehicle's manufacturer had secured its system using keys that were not only publicly known but had been lifted from programming examples.…

  • August 17th 2022 at 20:19

After 7 years, long-term threat DarkTortilla crypter is still evolving

.NET-based malware can push wide range of malicious payloads, and evades detection, Secureworks says

A highly pervasive .NET-based crypter that has flown under the radar since about 2015 and can deliver a wide range of malicious payloads continues to evolve rapidly, with almost 10,000 code samples being uploaded to VirusTotal over a 16-month period.…

  • August 17th 2022 at 18:41

How to stop the evil lurking in the shadows

Webinar Barely a day goes by without news of a ransomware attack somewhere in the media. And these types of cyber security incident can seriously derail financial, social, health and industrial activity, inflicting massive damage and requiring a multiagency response in their aftermath.…

  • August 17th 2022 at 16:54

TikTok wants your trust around US midterm elections data

Misinformation's a concern, but Chinese media giant's own data privacy practices also have people worried

TikTok has joined Twitter in publishing new US midterm misinformation rules, with considerable crossover in scope and style.…

  • August 17th 2022 at 16:00

Mozilla finds 18 of 25 popular reproductive health apps share your data

Scary in post-Roe America, and Poland, and far too many other places

It's official: your period and/or pregnancy tracker will probably share your data with law enforcement.…

  • August 17th 2022 at 08:00

PC store told it can't claim full cyber-crime insurance after social-engineering attack

Two different kinds of fraud, says judge while throwing out lawsuit against insurer

A Minnesota computer store suing its crime insurance provider has had its case dismissed, with the courts saying it was a clear instance of social engineering, a crime for which the insurer was only liable to cover a fraction of total losses.…

  • August 16th 2022 at 16:43

Russian military uses Chinese drones and bots in combat, over manufacturers' protests

Testimonials from Russian generals not welcomed by DJI or Unitree Robotics

Russia's military has praised civilian grade Chinese-made drones and robots for having performed well on the battlefield, leading their manufacturers to point out the equipment is not intended or sold for military purposes.…

  • August 17th 2022 at 05:30

RubyGems now requires multi-factor auth for top package maintainers

Sign-on you crazy diamond

RubyGems.org, the Ruby programming community's software package registry, now requires maintainers of popular "gems" to secure their accounts using multi-factor authentication (MFA).…

  • August 16th 2022 at 23:17

SEC says brokerage accounts hijacked for $1.3m pump-and-dump scam

18 people and businesses charged, one giant web of connections

America's financial watchdog has accused 18 individuals and shell companies of using compromised brokerage accounts to manipulate stock prices to rake in $1.3 million in illicit profits.…

  • August 16th 2022 at 21:25

Do you know what’s happening on your users’ devices?

Head this way to find if your strategy’s on (end) point

Sponsored Post You might be happy with your cloud infrastructure and totally on top of your internal network, but one thing for certain is that whatever your workforce is doing, they'll have endpoints. Are you sure you know exactly what's happening on all those devices?…

  • August 16th 2022 at 14:39

Microsoft's macOS Tamper Protection hits general availability

A boon for administrators having to deal with Apple hardware while also keeping everything secure

Microsoft Defender for Endpoint's Tamper Protection in macOS has entered general availability.…

  • August 16th 2022 at 14:03

1,900 Signal users exposed: Twilio attacker 'explicitly' looked for certain numbers

Bad guy also got SMS verification codes, and re-registered one of the numbers they searched for

Updated The security breach at Twilio earlier this month affected at least one high-value customer, Signal, and led to the exposure of the phone number and SMS registration codes for 1,900 users of the encrypted messaging service, it confirmed.…

  • August 16th 2022 at 12:33

Reckon Russian spies are lurking in your inbox? Check for these IOCs, Microsoft says

Seaborgium targeted dozens of orgs this year alone

Microsoft said it disabled accounts used by Russian-linked Seaborgium troupe to phish and steal credentials from its customers as part of the cybercrime gang's illicit spying and data-stealing activities.…

  • August 16th 2022 at 10:16

Digital Ocean dumps Mailchimp after attack leaked customer email addresses

Somebody went after crypto-centric companies’ outsourced email but the damage was felt in the cloud

Junior cloud Digital Ocean has revealed that some of its clients’ email addresses were exposed to attackers, thanks to an attack on email marketing service Mailchimp.…

  • August 16th 2022 at 05:31

It's 2022 and there are still thousands of public systems using password-less VNC

Let alone the ones with 123456 to login. How sophisticated do attackers really need to be?

Thousands of machines on the public internet can be remotely controlled via VNC without any authentication, a cybersecurity vendor has reminded us this month.…

  • August 16th 2022 at 02:36

Oh Deere: Farm hardware jailbroken to run Doom

Corn-y demo heralded as right-to-repair win

At DEF CON 30 on Saturday, an Australian who goes by the handle Sick Codes showed off a way to fully take control of some John Deere farming machine electronics to run first-person shooter Doom.…

  • August 16th 2022 at 00:53

CIA accused of illegally spying on Americans visiting Assange in embassy

Lawyers, journalists sue super-snoop agency and Spanish security biz

The CIA illegally spied on US citizens while they visited WikiLeaks publisher Julian Assange inside the Ecuadorian embassy in London, a lawsuit filed today has claimed.…

  • August 15th 2022 at 19:37

Dutch authorities arrest 29-year-old dev with suspected ties to Tornado Cash

The arrest comes days after US Treasury levies sanctions against the crypto mixing service

Dutch authorities have arrested a software developer suspected of working with Tornado Cash, a cryptocurrency mixing service that only two days earlier was sanctioned by the US government for allegedly laundering money for ransomware operators and other cybercriminals.…

  • August 15th 2022 at 17:31

Indian military ready to put long-range quantum key distribution on the line

Local startup can make it happen over 150km

India's military has celebrated the nation's Independence Day by announcing it will adopt locally developed quantum key distribution (QKD) technology that can operate across distances of 150km.…

  • August 15th 2022 at 06:56

Black Hat and DEF CON visitors differ on physical risk management

COVID, flood surfing, crowds – what to pick?

Black Hat As last week's hacker summer camps wound down it's clear that attendee numbers are still well down on the pre-COVID days, although things are recovering.…

  • August 15th 2022 at 04:58

Elon Musk wrote article for China's internet regulator, hinted at aged care robots

PLUS Vietnam's massive infosec push; Philippines telco fight; Australia dumps COVID app; and more

Asia in Brief Elon Musk has written an article for the Cyberspace Administration of China's flagship magazine.…

  • August 14th 2022 at 23:45

Ukraine's cyber chief comes to Black Hat in surprise visit

TL;DR: The news isn't good

Black Hat In Brief Victor Zhora, Ukraine's lead cybersecurity official, made an unannounced visit to Black Hat in Las Vegas this week, where he spoke to attendees about the state of cyberwarfare in the country's conflict with Russia. The picture Zhora painted was bleak.…

  • August 13th 2022 at 10:00

Let there be ambient light sensing, without fear of data theft

Six years on web devs finally settle on sensor privacy defenses

Six years after web security and privacy concerns surfaced about ambient light sensors in mobile phones and notebooks, browser boffins have finally implemented defenses.…

  • August 13th 2022 at 00:24

Palo Alto bug used for DDoS attacks and there's no fix yet

There goes the weekend...

A high-severity Palo Alto Networks denial-of-service (DoS) vulnerability has been exploited by miscreants looking to launch DDoS attacks, and several of the affected products won't have a patch until next week.…

  • August 12th 2022 at 23:17

Starlink satellite dish cracked on stage at Black Hat

Once the modchip plans are live, you can, too

Black Hat A security researcher has shown how to, with physical access at least, fully take over a Starlink satellite terminal using a homemade modchip.…

  • August 12th 2022 at 22:40

US reveals 'Target' pic of Conti man with $10m reward offer

Fashion Police chipping in on the bounty related to costliest strain of ransomware on record

The US government is putting a face on a claimed member of the infamous Conti ransomware group as part of a $10 million reward for information about five of the gang's crew.…

  • August 12th 2022 at 19:30

Microsoft trumps Google for 2021-22 bug bounty payouts

Another $13.7m handed out to researchers, but then again it does have an awful lot of attack surfaces

Microsoft appears to have beat Google on the bug bounty front, with $13.7 million in rewards spread out over 335 researchers.…

  • August 12th 2022 at 18:00

Intel ups protection against physical chip attacks in Alder Lake

Repurposes logic originally used for spotting variations in voltage, timing in older circuits to help performance

Black Hat Intel has disclosed how it may be able to protect systems against some physical threats by repurposing circuitry originally designed to counter variations in voltage and timing that may occur as silicon circuits age.…

  • August 12th 2022 at 15:00

Emergency services call-handling provider: Ransomware forced it to pull servers offline

Advanced's infrastructure still down and out, recovery to take weeks or more

Advanced, the MSP forced to shut down some of its servers last week after identifying an "issue" with its infrastructure hosting products, has confirmed a ransomware attack and says recovery will be in the order of weeks.…

  • August 12th 2022 at 13:06

FAANGs failing on keeping user data safe from bug hunters

Time to call in the legal team

Black Hat Dylan Ayrey, a bug hunter and CEO of Truffle Security, discovered a big data company credential dump containing personal information belonging to about 50,000 of its users, and still hasn't fixed it. …

  • August 12th 2022 at 00:58

Higher risks and premiums are creating critical gap in cyber insurance

Most organizations don’t have the financial resources necessary to address ransomware and other cyberattacks, BlackBerry says

Black Hat Many organizations are increasingly unprepared to deal with the skyrocketing costs of a ransomware attacks, at a time when the number of incidents and the payments demanded by cybercriminals are rising rapidly.…

  • August 11th 2022 at 23:03

Security needs to learn from the aviation biz to avoid crashing

'Until someone has to go to jail for doing it wrong the teeth are not going to be the same'

Black Hat video The security industry needs to take a leaf from the manual of an industry where smart incident response is literally life and death, if it is to fix systemic problems.…

  • August 11th 2022 at 22:30

Russian invasion has dangerously destabilized cyber security norms

The inside scoop on the Ukrainian IT army, and what could happen next

Black Hat The hacktivist attacks that have occurred during the ongoing war in Ukraine are setting a dangerous precedent for cyber norms β€” and infrastructure security, according to journalist and author Kim Zetter.…

  • August 11th 2022 at 21:30

AWS and Splunk partner for faster cyberattack response

OCSF initiative will give enterprise security teams an open standard for moving and analyzing threat data

Black Hat AWS and Splunk are leading an initiative aimed at creating an open standard for ingesting and analyzing data, enabling enterprise security teams to more quickly respond to cyberthreats.…

  • August 11th 2022 at 20:45

Ex-CIA security boss predicts coming crackdown on spyware

Plus, spoiler alert: ransomware is gonna get a lot worse

Black Hat video It turns out that ex-CIA chief information security officers don't spill secrets at bars in Vegas. Or via Zoom, while pretending to be at a Black Hat cocktail party.…

  • August 11th 2022 at 19:15

Sonatype spots another PyPI package behaving badly

Identity of a real person was used to lend credence to a package that dropped cryptominer in memory

Sonatype has unearthed yet more malware lurking on PyPI, this time a fileless Linux nasty designed to mine Monero and using the identity of a real person to lend credibility to the package.…

  • August 11th 2022 at 18:30

Keeping the enemy at the gate

Stop ransomware with Zero Trust security networks in place

Webinar Faced with relentless cyberattacks organizations need the kind of defenses usually reserved for small states. And everything that Zero Trust principles can pull into play will help safeguard against the nimble nastiness of the dark actors intent on doing harm.…

  • August 11th 2022 at 17:21

Don't be surprised if your organization suffers multiple cyberattacks

Failing to fix flaws, a crowded threat group scene, RaaS, and dependencies among crooks are fueling the trend

Black Hat Security experts spent years warning enterprises to expect cyberattacks and to plan their defenses accordingly, now Sophos researchers are saying organizations shouldn't be surprised if they get attacked multiple times.…

  • August 11th 2022 at 16:15

Making the cloud a safer place with SANS

Get advice from experts on how to nail cloud native security in a multi-cloud world

Sponsored Post Protecting sensitive data and mission critical applications spread across multiple on- and off-prem cloud environments and different service providers is a tough gig for busy security professionals. So a chance to hear from experts and peers on how best to stop hackers from making hay will be welcome.…

  • August 11th 2022 at 11:01

Cisco admits corporate network compromised by gang with links to Lapsus$

Voice-phished their way in, but Switchzilla claims no damage done

Cisco disclosed on Wednesday that its corporate network was accessed by cyber-criminals in May after an employee's personal Google account was compromised – an act a ransomware gang named "Yanluowang" has now claimed as its work.…

  • August 11th 2022 at 05:59

Meta privacy red team lead: Does your business know its privacy adversaries?

Ethical hackers, but for privacy programs

Black Hat Video Miscreants aren't only working to exploit flaws in an enterprise's security posture, they're also looking for holes in organizations' privacy programs to steal user data, according to Meta's Scott Tenaglia.…

  • August 11th 2022 at 01:15

Boffins rate npm and PyPI package security and it's not good

Guess what? Open source security still has gaps

The Open Source Security Foundation (OpenSSF), as its name plainly states, aims to help make open source software more secure, but improvements flowing from its efforts are hard to find.…

  • August 11th 2022 at 00:54

Ex-CISA chief Krebs calls for US to get serious on security

Black Hat kicks off with call for single infosec agency with real clout and less confused crossover

Black Hat It's time to reorganize the US government and create a new agency focused solely on on digital risk management services, according to former CISA director Chris Krebs.…

  • August 10th 2022 at 23:26

As Black Hat kicks off, the US government is getting the message on hiring security talent

Katie Moussouris tells it like it is

Black Hat Video With the world's largest collection of security folk gathering in Las Vegas for the Black Hat conference there are encouraging signs that the US government might actually be getting smarter about hiring.…

  • August 10th 2022 at 20:58

Maui ransomware linked to North Korean group Andariel

Attack origins point to April 2021 first strike on Japanese target

The Maui ransomware that has been used against US healthcare operations has been linked to Andariel, a North Korean state-sponsored threat with links to the notorious Lazarus Group.…

  • August 10th 2022 at 18:14

Google's bug bounty boss: Finding and patching vulns? 'Totally useless'

Disclosing exploits, however, will earn you $100k

Simply finding vulnerabilities and patching them "is totally useless," according to Google's Eduardo Vela, who heads the cloud giant's product security response team.…

  • August 10th 2022 at 16:00

Cloudflare: Someone tried to pull the Twilio phishing tactic on us too

Attack was foiled by content delivery network's hardware security keys

Cloudflare says it was subject to a similar attack to one made on comms company Twilio last week, but in this case it was thwarted by hardware security keys that are required to access applications and services.…

  • August 10th 2022 at 14:23

Businesses should dump Windows for the Linux desktop

It makes perfect sense for enterprises as well as enthusiasts. Just ask GitLab

Opinion I've been preaching the gospel of the Linux desktop for more years than some of you have been alive. However, unless you argue that the Linux desktop includes Android smartphones and ChromeOS laptops, there will be no year of the Linux desktop.…

  • August 10th 2022 at 10:32

Patch Tuesday: Yet another Microsoft RCE bug under active exploit

Oh, and that critical VMware auth bypass vuln? Miscreants found it, too

August Patch Tuesday clicks off the week of hacker summer camp in Las Vegas this year, so it's basically a code cracker's holiday too. …

  • August 9th 2022 at 21:51

APIC fail: Intel 'Sunny Cove' chips with SGX spill secrets

AMD Zen chips, meanwhile, are vulnerable to side-channel data scrying

A group of computer scientists has identified an architectural error in certain recent Intel CPUs that can be abused to expose SGX enclave data like private encryption keys.…

  • August 9th 2022 at 17:00

Malicious deepfakes used in attacks up 13% from last year, VMware finds

Plus: Crooks swimming around your network, looking for a way in, says Incident Response Threat Report

Security teams are facing down more cyberattacks following Russia's invasion of Ukraine, and sophisticated crooks are using double-extortion techniques and, increasingly, deepfakes in their strikes.…

  • August 9th 2022 at 15:11

Microsoft's fix for 'data damage' risk hits PC performance

'AES-based operations might be two times slower' without latest updates

Microsoft has warned that Windows devices with the newest supported processors might be susceptible to data damage, noting the initial fix might have slowed operations down for some.…

  • August 9th 2022 at 13:30

Chinese scammers target kids with promise of extra gaming hours

Cyberspace regulator's fraud report finds all is not well behind the Great Firewall

Fraudsters in China have targeted a child with promises of allowing them to get around the nation's time limits on playing computer games – for a mere $560, according to the nation's cyberspace administration. Yesterday the CAC detailed some of the 12,000 acts of online fraud perpetrated against minors it handled this year.…

  • August 9th 2022 at 02:45

China-linked spies used six backdoors to steal info from defense, industrial enterprise orgs

We're 'highly likely' to see similar attacks, Kaspersky warned

Beijing-backed cyberspies used specially crafted phishing emails and six different backdoors to break into and then steal confidential data from military and industrial groups, government agencies and other public institutions, according to Kaspersky researchers.…

  • August 9th 2022 at 00:23
❌