FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayThe Register - Security

Red Hat backs CNCF project, spills TEE support over Kubernetes

Keeping the contents of your clusters secure from whoever's hosting them

Red Hat is backing a Cloud Native Computing Foundation (CNCF) project that aims to improve the security of containers in Kubernetes clusters by running them inside hardware-enforced enclaves.…

  • October 10th 2022 at 16:00

It’s 2022 and netizens are only now getting serious about cybersecurity

US folks start to get the message about protecting themselves online

End users, often viewed by infosec specialists as a corporation's weakest link, appear to be finally understanding the importance of good security and privacy practices.…

  • October 10th 2022 at 12:30

Singtel confirms digital burglary at Dialog subsidiary

Second of Singapore telco's Australian businesses to be prised open by criminals in weeks

Singtel has confirmed that another Australian business it owns, consulting unit Dialog, has fallen victim to a cyber burglary just weeks after the mammoth data leak at telco Optus was revealed.…

  • October 10th 2022 at 10:47

Criminal multitool LilithBot arrives on malware-as-a-service scene

Bespoke botnet up for grabs from outfit praised for, er, customer service

A Russia based threat group that set up a malware distribution shop earlier this year is behind a Swiss Army knife-like botnet that comes with a range of other malicious capabilities, from stealing information to mining cryptocurrency.…

  • October 10th 2022 at 09:29

How do you protect your online systems? Cultivate an insider threat

Challenge your people to try to break into your systems, and see how interesting life gets for your colleagues

Opinion People are the biggest problem in corporate infosec. Make them the biggest asset. …

  • October 10th 2022 at 08:30

Mastercard moves to protect 'risky and frisky' crypto transactions

Expands into a sector so toxic many won't touch it

Supposedly ingenious schemes to revolutionize the finance industry with crypto are not hard to find – nor are their failures. And scarcely a day passes on which a cryptocurrency venture's infosec is not found wanting. That sad situation is causing financial institutions sufficient pain that Mastercard thinks the time is ripe for a service that helps lenders to understand if their customers' crypto purchases are dangerous.…

  • October 10th 2022 at 06:57

That thing to help protect internet traffic from hijacking? Here's how to break it

RPKI is supposed to verify network routes. Cyber-researchers suggest ways to potentially defeat it

An internet security mechanism called Resource Public Key Infrastructure (RPKI), intended to safeguard the routing of data traffic, can be broken.…

  • October 9th 2022 at 19:31

When are we gonna stop calling it ransomware? It's just data kidnapping now

It's not like the good old days with iffy cryptography and begging for keys

Comment It's getting difficult these days to find a ransomware group that doesn't steal data and promise not to sell it if a ransom is paid off. What's more, these criminals are going down the extortion-only route, and not even bothering to scramble your files with encryption.…

  • October 9th 2022 at 08:12

Biden's Privacy Shield 2.0 order may not satisfy Europe

Also, Albania almost called in NATO over cyber attacks, and Facebook warns of account-stealing mobile apps

In brief An executive order signed by President Biden on Friday to setting out fresh rules on how the US and Europe share people's private personal info may still fall short of the EU's wishes, says the privacy advocate who defeated the previous regulations in court.…

  • October 8th 2022 at 10:56

Make your neighbor think their house is haunted by blinking their Ikea smart bulbs

Radio comms vulnerabilities detailed

A couple of vulnerabilities in Ikea smart lighting systems can be exploited to make lights annoyingly flicker for hours.…

  • October 8th 2022 at 08:08

Binance robbed of $600 million in crypto-tokens

How's your day going?

Cryptocurrency exchange Binance temporarily halted its blockchain network on Thursday in response to a cyberattack that led to the theft of two million BNB tokens, notionally exchangeable for $566 million in fiat currency.…

  • October 7th 2022 at 19:40

Utility security is so bad, US DoE offers rate cuts to improve it

New hardware? Consultants? You tell us because your infosec is off the grid

The US Department of Energy has proposed regulations to financially reward cybersecurity modernization at power plants by offering rate deals for everything from buying new hardware to paying for outside help.…

  • October 7th 2022 at 15:15

China upgrades Great Firewall to defeat censor-beating TLS tools

Just in time to ensure nobody can disagree that giving Xi five more years as president is the best idea ever

China appears to have upgraded its Great Firewall, the instrument of pervasive real-time censorship it uses to ensure that ideas its government doesn’t like don’t reach China’s citizens.…

  • October 6th 2022 at 03:31

Loads of PostgreSQL systems are sitting on the internet without SSL encryption

They probably shouldn't be connected in the first place, says database expert

Only a third of PostgreSQL databases connected to the internet use SSL for encrypted messaging, according to a cloud database provider.…

  • October 7th 2022 at 10:48

Hardening data security in the cloud

How Intel’s SGX hardware helps safeguard applications in multi-tenant environments

Sponsored Feature As enterprises continue to migrate applications into the cloud, security concerns about the data those workloads store and process are inevitable. But how can IT departments be certain that sensitive information covered by stringent data protection laws hosted in public, private and hybrid cloud environments spanning multiple servers and locations is adequately protected from both internal and external threats?…

  • October 7th 2022 at 08:29

Top of the Pops: US authorities list the 20 hottest vulns that China's hackers love to hit

Microsoft has four entries on list of shame, Log4j tops the chart

Three US national security agencies - CISA, the FBI and the NSA - on Thursday issued a joint advisory naming the 20 infosec exploited by state-sponsored Chinese threat actors since 2020.…

  • October 7th 2022 at 05:28

Lloyd's of London cuts off network after dodgy activity detected

Is it Putin? Is it the Norks? Is it a bored teenager? Roll the dice

Updated Lloyd's of London has cut off its IT systems and is probing a possible cyberattack against it after detecting worrisome network behavior this week.…

  • October 7th 2022 at 00:13

Huge nonprofit hospital network suffers IT meltdown after 'security incident'

Ambulances diverted, patient records frozen, rhymes with handsome wear

America's second-largest nonprofit healthcare org is suffering a security "issue" that has diverted ambulances and shut down electronic records systems at hospitals around the country.…

  • October 6th 2022 at 21:55

Papa John's sued for 'wiretap' spying on website mouse clicks, keystrokes

When the tracking hits your eye like a big pizza pie, that's a priori

Papa John's is being sued by a customer – not for its pizza but for allegedly breaking the US Wiretap Act by snooping on the way he browsed the pie-slinger's website.…

  • October 6th 2022 at 20:20

Foreign spies hijacking US mid-terms? FBI, CISA are cool as cucumbers about it

I think we can handle one little Russia. We sent two units, they're bringing any attempts down now

The FBI and the US government's Cybersecurity and Infrastructure Security Agency (CISA) claim any foreign interference in the 2022 US midterm elections is unlikely to disrupt or prevent voting, compromise ballot integrity, or manipulate votes at scale.…

  • October 6th 2022 at 17:30

South Korea cancels passport of Terraform Lab's Do Kwon

Whereabouts of wanted cryptobro unknown, but he's reliably on Twitter

South Korea issued a publicly available notice on Wednesday to wanted man and Terraform Labs founder Do Kwon, demanding he return his passport.…

  • October 6th 2022 at 16:02

Australian Federal Police arrest man suspected of exploiting Optus cyberattack

Customers were allegedly sent texts demanding $1,300 or face having ID used in financial crime

Aussie police have cuffed a 19-year-old Sydney resident accused of trying to extort money from victims of the recent cyberattack and digital burglary at national telecommunications provider Optus.…

  • October 6th 2022 at 12:30

Learning from real life situations

How about some cyber security education that’s actually delivered by people with genuine everyday experience?

Sponsored Post There's nothing much to be said in favour of cybercrime. It ruins legitimate endeavours and wrecks livelihoods. It does, though, build a sense togetherness among the people whose job is to stop it.…

  • October 6th 2022 at 09:00

Former Uber CSO convicted for covering up massive 2016 data theft

Passing off a ransom payment as a bug bounty? That's obstruction of justice

Joe Sullivan, Uber's former chief security officer, has been found guilty of illegally covering up the theft of Uber drivers and customers' personal information.…

  • October 6th 2022 at 00:33

NetWalker ransomware scumbag jailed for 20 years

And note to his crime pals – he said he would sing like a canary

An ex-Canadian government worker who extorted tens of millions of dollars from organizations worldwide using the NetWalker ransomware has been sent down for 20 years.…

  • October 5th 2022 at 22:54

Cyber-snoops broke into US military contractor, stole data, hid for months

Tell us it’s Russia without telling us it’s Russia

Spies for months hid inside a US military contractor's enterprise network and stole sensitive data, according to a joint alert from the US government's Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and NSA.…

  • October 5th 2022 at 19:27

Don’t let your employees become the weakest link

Watch our webinar to learn the best way to keep data protected from human error

Webinar "You are the weakest link, goodbye!". One of the most famous catchphrases in television history. Popularized by the BBC gameshow and delivered by caustic TV presenter Anne Robinson, it is still the ultimate put down.…

  • October 5th 2022 at 12:59

Modified version of Tor Browser spies on Chinese users

Patiently gathers data that can be used to identify the victims, says Kaspersky

Cybersecurity biz Kaspersky has spotted a modified version of the Tor Browser it says collects sensitive data on Chinese users.…

  • October 5th 2022 at 11:32

DoJ β€˜very disappointed’ with probation sentence for Capital One hacker Paige Thompson

β€˜This is not what justice looks like’ says official on sanction for leak of 100 million records

Convicted wire fraud perpetrator Paige Thompson (aka "erratic") has been sentenced to time served and five years of probation with location and computer monitoring, prompting U.S. Attorney Nick Brown to label the sanctions unsatisfactory.…

  • October 5th 2022 at 05:31

All your identity needs fulfilled

How to build an environment of trust and enhance customer experience

Video Digital transformation requires far-reaching and innovative business solutions, frequently tailormade.…

  • October 5th 2022 at 03:12

No Shangri-La for you: Top hotel chain confirms data leak

In Xanadu did Kubla Khan a stately pleasure-dome decree

Hotel chain Shangri-La Group has admitted to its systems being attacked, and personal data describing guests accessed by unknown parties, over a timeframe that includes the dates on which a high-level international defence conference was staged at one of its Singapore properties.…

  • October 5th 2022 at 02:15

Uncle Sam orders federal agencies to step up scans for govt IT security holes

Good time to be selling automation tools

The US government's Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal civilian agencies to scan for and report software vulnerabilities in their IT systems more frequently under a directive issued this week.…

  • October 4th 2022 at 22:26

Microsoft: Watch out for password spray attacks – especially you, Basic Auth

Exchange Online users should have authentication policies in place

Microsoft is warning Exchange Online users about a rise in password spray attacks, urging those that have yet to disable Basic Authentication to at least set up authentication policies to protect their users and data.…

  • October 4th 2022 at 16:15

Japanese sushi chain boss resigns amid accusation of improper data access

Data theft stinks, says victim. Alleged perp claims he's getting a raw deal

The president of casual Japanese chain restaurant Kappa Sushi resigned yesterday in the wake of a data-theft scandal that has rocked the world of sushi trains.…

  • October 4th 2022 at 05:56

Giveaways for every security professional

Don’t chuck money away before you’ve checked SANS free educational content

Sponsored Post Fighting cybercrime is an expensive business. If your cyber defences fail, then the cost can be measured in many ways. There's the price of repairing damaged infrastructure, retrieving lost data, and paying regulatory penalties. And the cost in reputational terms with customers simply has no metric.…

  • October 4th 2022 at 03:00

Atlassian, Microsoft bugs on CISA’s must-patch list after exploitation spree

Some days, security just feels like a total illusion. OK, most days...

A recently disclosed critical vulnerability in Atlassian's Bitbucket is actively being exploited, according to the US government.…

  • October 4th 2022 at 00:31

Online romance scamlord who netted $9.5m jailed for 25 years

Hello, love, I need $32k to fix my oil rig

A man in the US has been jailed for 25 years after using dating websites, email scams, and other online swindles to steal more than $9.5 million from companies and individuals.…

  • October 3rd 2022 at 22:15

From today, America and UK follow new rules on how they can demand your data from each other

Cops and Feds get easier info sharing, Britain benefits most

The Data Access Agreement (DAA), by which the US and UK have agreed how one country can respond to lawful data demands from police and investigators in the other, took effect on Monday.…

  • October 3rd 2022 at 19:11

It's 2058. A quantum computer is just another decade away. Still, you curse Cloudflare

Assuming this Kyber TLS stuff works as expected

Cloudflare is the first major internet infrastructure provider to support post-quantum cryptography for all customers, which, in theory, should protect data if quantum computing ever manages to break today's encryption technologies.…

  • October 3rd 2022 at 18:22

National Cybersecurity Awareness program 18 years on: Don't click that

Technology is addressing many of the cyberthreats, but the human element will always be a factor

If you've ever found yourself in an interminable meeting listening to the CISO ramble on about the important role you play in protecting yourself and the company from cyberthreats, you could probably point an accusatory finger in large part at the National Cybersecurity Awareness Month (NCSAM) program.…

  • October 3rd 2022 at 17:30

FBI: We tracked who was printing secret documents to unmask ex-NSA suspect

Infosec systems designer alleged to have chatted with undercover agent

A 30-year-old ex-NSA employee was accused by the FBI of trying to sell classified US information to a foreign government – after the Feds said they linked him to the printing of secret documents.…

  • October 3rd 2022 at 17:00

Cyber-proofing data in the cloud

How to reduce the risk and impact of ransomware attacks on AWS data and applications

Webinar Ransomware has a longer history than you might imagine. The very first recognized attack was at the World Health Organization in 1989 when the AIDS Trojan was distributed to 20,000 attendees via floppy disc.…

  • October 3rd 2022 at 13:24

Founder of cybersecurity firm Acronis is afraid of his own vacuum cleaner

It is the exponential changes in the course of human history that worry Serg Bell

Acronis founder Serg Bell is afraid of his own vacuum cleaner, he told The Register in Singapore last week.…

  • October 3rd 2022 at 10:46

Between ransomware and month-long engagements, IR teams need a hug – and a nap

Here's what 1,100 incident responders say about their jobs, just in time for NSCAM

Remember the good old days of cyber-incident response, when the job involved digital forensics and lots of stolen credit cards, as opposed to power-grid-breaking malware and multi-million-dollar ransom demands?…

  • October 3rd 2022 at 10:00

Moody's turns up the heat on 'riskiest' sectors for cyberattacks

$22 trillion of global rated debt has 'high' or 'very high' cyber-risk exposure

About $22 trillion of global debt rated by Moody's Investors Service has "high," or "very high" cyber-risk exposure, with electric, gas and water utilities, as well as hospitals, among the sectors facing the highest risk of cyberattacks.…

  • October 3rd 2022 at 06:33

Steganography alert: Backdoor spyware stashed in Microsoft logo

Now that's sticker shock

Internet snoops have been caught concealing spyware in an old Windows logo in an attack on governments in the Middle East.…

  • October 2nd 2022 at 12:56

BlackCat malware lashes out at US defense IT contractor

Also, Amazon's Ring footage TV shows draws criticism, US v Soviet spying docs found, and more

In Brief The BlackCat ransomware gang, also known as ALPHV, has allegedly broken into IT firm NJVC, a provider of services to civilian US government agencies and the Department of Defense.…

  • October 2nd 2022 at 08:47

Gone in a day: Ethical hackers say it would take mere hours to empty your network

300 red teamers walk into a bar…

Once they've broken into an IT environment, most intruders need less than five hours to collect and steal sensitive data, according to a SANS Institute survey of more than 300 ethical hackers. …

  • October 1st 2022 at 09:57

Microsoft warns of North Korean crew posing as LinkedIn recruiters

State-sponsored ZINC allegedly passes on malware-laden open source apps

Microsoft has claimed a North Korean crew poses as LinkedIn recruiters to distribute poisoned versions of open source software packages.…

  • September 30th 2022 at 05:53

Stop us if you've heard this one before: Exchange Server zero-days actively exploited

Remember this next time Microsoft talks about how seriously it takes security

Updated Infosec experts have warned zero-day flaws in Microsoft’s Exchange server are being actively exploited.…

  • September 30th 2022 at 03:03

Ex-eBay execs jailed for cyberstalking web critics

Still to come: Civil RICO lawsuit against e-souk and former top brass

Two now-former eBay executives who pleaded guilty to cyberstalking charges this year have been sent down and fined tens of thousands of dollars.…

  • September 30th 2022 at 00:58

How CIA betrayed informants with shoddy front websites built for covert comms

Top tip, don't give your secret login box the HTML form type 'password'

For almost a decade, the US Central Intelligence Agency communicated with informants abroad using a network of websites with hidden communications capabilities.…

  • September 29th 2022 at 23:03

Pentagon is far too tight with its security bug bounties

But overpriced, useless fighter jets? That's something we can get behind

Discovering and reporting critical security flaws that could allow foreign spies to steal sensitive US government data or launch cyberattacks via the Department of Defense's IT systems doesn't carry a high reward.…

  • September 29th 2022 at 21:27

Covert malware targets VMware shops for hypervisor-level espionage

Mandiant tracks back operators, finds ties to China

Emerging covert malware can target VMware environments to allow criminals to gain persistent administrative access to hypervisors, transfer files, and execute arbitrary commands on virtual machines, according to VMware and Mandiant, which discovered such a software nasty in the wild earlier this year.…

  • September 29th 2022 at 13:00

Microsoft to kill off old access rules in Exchange Online

Awoooogah – this is your one-year warning to switch over, enterprises

Microsoft next month will start phasing out Client Access Rules (CARs) in Exchange Online – and will do away with this means for controlling access altogether within a year.…

  • September 28th 2022 at 23:34

Matrix chat encryption sunk by five now-patched holes

You take the green pill, you'll spend six hours in a 'don't roll your own crypto' debate

Four security researchers have identified five cryptographic vulnerabilities in code libraries that can be exploited to undermine Matrix encrypted chat clients. This includes impersonating users and sending messages as them.…

  • September 28th 2022 at 21:22

The web's cruising at 13 million new and nefarious domain names a month

Or so Akamai is dying to tell us

Akamai reckons that, in the first half of 2022 alone, it flagged nearly 79 million newly observed domains (NODs) as malicious.…

  • September 28th 2022 at 20:20

Want to sneak a RAT into Windows? Buy Quantum Builder on the dark web

Beware what could be hiding in those LNK shortcuts

A tool sold on the dark web that allows cybercriminals to build malicious shortcuts for delivering malware is being used in a campaign pushing a longtime .NET keylogger and remote access trojan (RAT) named Agent Tesla.…

  • September 28th 2022 at 17:00

Hacked Fast Company sends 'obscene and racist' alerts via Apple News

Someone going by 'Thrax' claims responsibility for 'incredibly easy' breach

Apple News shut down Fast Company's news channel after "an incredibly offensive alert" was sent to subscribers following a hack of the business publication on Tuesday evening.…

  • September 28th 2022 at 16:30

Reducing the risk of human error in cyber security

Tips on how to turn a potential weakness into a towering strength

Webinar We all make mistakes. Some happy accidents enhance the way we live. Matches were invented when scientist John Walker was cleaning his laboratory with a wooden stick coated in chemicals and it caught fire. But if you are trying to secure your data, unforced errors are the last thing you need to torch it.…

  • September 28th 2022 at 13:56
❌