FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayThe Register - Security

China could use Digital Yuan to swerve Russia-style sanctions

GCHQ spy boss talks up threat of east's tech dominance, says Putin has 'badly misjudged' Ukraine attack

UK intelligence agency GCHQ says China is "learning lessons" from the war in Ukraine and could make use of a centralized digital currency to partly get around the type of sanctions being imposed on Putin's Russia.…

  • October 11th 2022 at 15:00

If you're wondering why Google blew $5b on Mandiant, this may shed some light

Automating infosec knowhow, essentially

GCN Mandiant, now officially owned by Google, has the scale (not to mention the deep pockets) to be the "brain" across organizations' myriad security products and automate protection on top of these controls, according to the security shop's CEO Kevin Mandia.…

  • October 11th 2022 at 12:00

Fortinet warns of critical flaw in its security appliance OSes, admin panels

Naturally, they're already under attack – so you know what to do next

Security appliance vendor Fortinet has become the subject of a bug report by its own FortiGuard Labs after the discovery of a critical-rated flaw in three of its products.…

  • October 11th 2022 at 10:32

Can IAM help save on cyber insurance?

Demonstrating a robust defense can help underwrite cyber risk for customers and providers, says One Identity

Sponsored Feature Underwriters are continuing to feel the pinch as cyber insurance claims mount. That means customers are hurting too, with policies becoming more costly and insurers demanding more proof of cybersecurity. So how do organizations make better use of identity and access management to demonstrate their competency in protecting people's sensitive personal and financial data?…

  • October 11th 2022 at 08:10

Optus data breach prompts pincer movement of twin regulatory probes

Data retention requirements to be considered alongside infosec failings

Australian carrier Optus's recent data breach will be investigated by two regulators, the double trouble likely an indicator of the nation's displeasure at the incident – which saw almost ten million locals' personal data exposed online.…

  • October 11th 2022 at 04:57

Toyota dev left key to customer info on public GitHub page for five years

'Oh what a feeling' when your contractor leaks site source code

Toyota has admitted it put 296,019 email addresses and customer management numbers of folks who signed up for its T-Connect assistance website at risk of online theft by bungling its security.…

  • October 11th 2022 at 01:06

Pro-Putin goons claim responsibility for blowing US airport websites offline

How's that boot taste?

Updated Russian miscreants claimed responsibility for knocking more than a dozen US airports' websites offline on Monday morning in what appeared to be a large-scale, distributed-denial-of-service (DDoS) attack.…

  • October 10th 2022 at 18:12

Intel Alder Lake BIOS code leak may contain vital secrets

Gurus say source includes secret hardware info, private signing key for Boot Guard protection

Source code for the BIOS used with Intel's 12th-gen Core processors has been leaked online, possibly including details of undocumented model-specific registers (MSRs) and even the private signing key for Intel's Boot Guard security technology.…

  • October 10th 2022 at 16:45

Red Hat backs CNCF project, spills TEE support over Kubernetes

Keeping the contents of your clusters secure from whoever's hosting them

Red Hat is backing a Cloud Native Computing Foundation (CNCF) project that aims to improve the security of containers in Kubernetes clusters by running them inside hardware-enforced enclaves.…

  • October 10th 2022 at 16:00

It’s 2022 and netizens are only now getting serious about cybersecurity

US folks start to get the message about protecting themselves online

End users, often viewed by infosec specialists as a corporation's weakest link, appear to be finally understanding the importance of good security and privacy practices.…

  • October 10th 2022 at 12:30

Singtel confirms digital burglary at Dialog subsidiary

Second of Singapore telco's Australian businesses to be prised open by criminals in weeks

Singtel has confirmed that another Australian business it owns, consulting unit Dialog, has fallen victim to a cyber burglary just weeks after the mammoth data leak at telco Optus was revealed.…

  • October 10th 2022 at 10:47

Criminal multitool LilithBot arrives on malware-as-a-service scene

Bespoke botnet up for grabs from outfit praised for, er, customer service

A Russia based threat group that set up a malware distribution shop earlier this year is behind a Swiss Army knife-like botnet that comes with a range of other malicious capabilities, from stealing information to mining cryptocurrency.…

  • October 10th 2022 at 09:29

How do you protect your online systems? Cultivate an insider threat

Challenge your people to try to break into your systems, and see how interesting life gets for your colleagues

Opinion People are the biggest problem in corporate infosec. Make them the biggest asset. …

  • October 10th 2022 at 08:30

Mastercard moves to protect 'risky and frisky' crypto transactions

Expands into a sector so toxic many won't touch it

Supposedly ingenious schemes to revolutionize the finance industry with crypto are not hard to find – nor are their failures. And scarcely a day passes on which a cryptocurrency venture's infosec is not found wanting. That sad situation is causing financial institutions sufficient pain that Mastercard thinks the time is ripe for a service that helps lenders to understand if their customers' crypto purchases are dangerous.…

  • October 10th 2022 at 06:57

That thing to help protect internet traffic from hijacking? Here's how to break it

RPKI is supposed to verify network routes. Cyber-researchers suggest ways to potentially defeat it

An internet security mechanism called Resource Public Key Infrastructure (RPKI), intended to safeguard the routing of data traffic, can be broken.…

  • October 9th 2022 at 19:31

When are we gonna stop calling it ransomware? It's just data kidnapping now

It's not like the good old days with iffy cryptography and begging for keys

Comment It's getting difficult these days to find a ransomware group that doesn't steal data and promise not to sell it if a ransom is paid off. What's more, these criminals are going down the extortion-only route, and not even bothering to scramble your files with encryption.…

  • October 9th 2022 at 08:12

Biden's Privacy Shield 2.0 order may not satisfy Europe

Also, Albania almost called in NATO over cyber attacks, and Facebook warns of account-stealing mobile apps

In brief An executive order signed by President Biden on Friday to setting out fresh rules on how the US and Europe share people's private personal info may still fall short of the EU's wishes, says the privacy advocate who defeated the previous regulations in court.…

  • October 8th 2022 at 10:56

Make your neighbor think their house is haunted by blinking their Ikea smart bulbs

Radio comms vulnerabilities detailed

A couple of vulnerabilities in Ikea smart lighting systems can be exploited to make lights annoyingly flicker for hours.…

  • October 8th 2022 at 08:08

Binance robbed of $600 million in crypto-tokens

How's your day going?

Cryptocurrency exchange Binance temporarily halted its blockchain network on Thursday in response to a cyberattack that led to the theft of two million BNB tokens, notionally exchangeable for $566 million in fiat currency.…

  • October 7th 2022 at 19:40

Utility security is so bad, US DoE offers rate cuts to improve it

New hardware? Consultants? You tell us because your infosec is off the grid

The US Department of Energy has proposed regulations to financially reward cybersecurity modernization at power plants by offering rate deals for everything from buying new hardware to paying for outside help.…

  • October 7th 2022 at 15:15

China upgrades Great Firewall to defeat censor-beating TLS tools

Just in time to ensure nobody can disagree that giving Xi five more years as president is the best idea ever

China appears to have upgraded its Great Firewall, the instrument of pervasive real-time censorship it uses to ensure that ideas its government doesn’t like don’t reach China’s citizens.…

  • October 6th 2022 at 03:31

Loads of PostgreSQL systems are sitting on the internet without SSL encryption

They probably shouldn't be connected in the first place, says database expert

Only a third of PostgreSQL databases connected to the internet use SSL for encrypted messaging, according to a cloud database provider.…

  • October 7th 2022 at 10:48

Hardening data security in the cloud

How Intel’s SGX hardware helps safeguard applications in multi-tenant environments

Sponsored Feature As enterprises continue to migrate applications into the cloud, security concerns about the data those workloads store and process are inevitable. But how can IT departments be certain that sensitive information covered by stringent data protection laws hosted in public, private and hybrid cloud environments spanning multiple servers and locations is adequately protected from both internal and external threats?…

  • October 7th 2022 at 08:29

Top of the Pops: US authorities list the 20 hottest vulns that China's hackers love to hit

Microsoft has four entries on list of shame, Log4j tops the chart

Three US national security agencies - CISA, the FBI and the NSA - on Thursday issued a joint advisory naming the 20 infosec exploited by state-sponsored Chinese threat actors since 2020.…

  • October 7th 2022 at 05:28

Lloyd's of London cuts off network after dodgy activity detected

Is it Putin? Is it the Norks? Is it a bored teenager? Roll the dice

Updated Lloyd's of London has cut off its IT systems and is probing a possible cyberattack against it after detecting worrisome network behavior this week.…

  • October 7th 2022 at 00:13

Huge nonprofit hospital network suffers IT meltdown after 'security incident'

Ambulances diverted, patient records frozen, rhymes with handsome wear

America's second-largest nonprofit healthcare org is suffering a security "issue" that has diverted ambulances and shut down electronic records systems at hospitals around the country.…

  • October 6th 2022 at 21:55

Papa John's sued for 'wiretap' spying on website mouse clicks, keystrokes

When the tracking hits your eye like a big pizza pie, that's a priori

Papa John's is being sued by a customer – not for its pizza but for allegedly breaking the US Wiretap Act by snooping on the way he browsed the pie-slinger's website.…

  • October 6th 2022 at 20:20

Foreign spies hijacking US mid-terms? FBI, CISA are cool as cucumbers about it

I think we can handle one little Russia. We sent two units, they're bringing any attempts down now

The FBI and the US government's Cybersecurity and Infrastructure Security Agency (CISA) claim any foreign interference in the 2022 US midterm elections is unlikely to disrupt or prevent voting, compromise ballot integrity, or manipulate votes at scale.…

  • October 6th 2022 at 17:30

South Korea cancels passport of Terraform Lab's Do Kwon

Whereabouts of wanted cryptobro unknown, but he's reliably on Twitter

South Korea issued a publicly available notice on Wednesday to wanted man and Terraform Labs founder Do Kwon, demanding he return his passport.…

  • October 6th 2022 at 16:02

Australian Federal Police arrest man suspected of exploiting Optus cyberattack

Customers were allegedly sent texts demanding $1,300 or face having ID used in financial crime

Aussie police have cuffed a 19-year-old Sydney resident accused of trying to extort money from victims of the recent cyberattack and digital burglary at national telecommunications provider Optus.…

  • October 6th 2022 at 12:30

Learning from real life situations

How about some cyber security education that’s actually delivered by people with genuine everyday experience?

Sponsored Post There's nothing much to be said in favour of cybercrime. It ruins legitimate endeavours and wrecks livelihoods. It does, though, build a sense togetherness among the people whose job is to stop it.…

  • October 6th 2022 at 09:00

Former Uber CSO convicted for covering up massive 2016 data theft

Passing off a ransom payment as a bug bounty? That's obstruction of justice

Joe Sullivan, Uber's former chief security officer, has been found guilty of illegally covering up the theft of Uber drivers and customers' personal information.…

  • October 6th 2022 at 00:33

NetWalker ransomware scumbag jailed for 20 years

And note to his crime pals – he said he would sing like a canary

An ex-Canadian government worker who extorted tens of millions of dollars from organizations worldwide using the NetWalker ransomware has been sent down for 20 years.…

  • October 5th 2022 at 22:54

Cyber-snoops broke into US military contractor, stole data, hid for months

Tell us it’s Russia without telling us it’s Russia

Spies for months hid inside a US military contractor's enterprise network and stole sensitive data, according to a joint alert from the US government's Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and NSA.…

  • October 5th 2022 at 19:27

Don’t let your employees become the weakest link

Watch our webinar to learn the best way to keep data protected from human error

Webinar "You are the weakest link, goodbye!". One of the most famous catchphrases in television history. Popularized by the BBC gameshow and delivered by caustic TV presenter Anne Robinson, it is still the ultimate put down.…

  • October 5th 2022 at 12:59

Modified version of Tor Browser spies on Chinese users

Patiently gathers data that can be used to identify the victims, says Kaspersky

Cybersecurity biz Kaspersky has spotted a modified version of the Tor Browser it says collects sensitive data on Chinese users.…

  • October 5th 2022 at 11:32

DoJ β€˜very disappointed’ with probation sentence for Capital One hacker Paige Thompson

β€˜This is not what justice looks like’ says official on sanction for leak of 100 million records

Convicted wire fraud perpetrator Paige Thompson (aka "erratic") has been sentenced to time served and five years of probation with location and computer monitoring, prompting U.S. Attorney Nick Brown to label the sanctions unsatisfactory.…

  • October 5th 2022 at 05:31

All your identity needs fulfilled

How to build an environment of trust and enhance customer experience

Video Digital transformation requires far-reaching and innovative business solutions, frequently tailormade.…

  • October 5th 2022 at 03:12

No Shangri-La for you: Top hotel chain confirms data leak

In Xanadu did Kubla Khan a stately pleasure-dome decree

Hotel chain Shangri-La Group has admitted to its systems being attacked, and personal data describing guests accessed by unknown parties, over a timeframe that includes the dates on which a high-level international defence conference was staged at one of its Singapore properties.…

  • October 5th 2022 at 02:15

Uncle Sam orders federal agencies to step up scans for govt IT security holes

Good time to be selling automation tools

The US government's Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal civilian agencies to scan for and report software vulnerabilities in their IT systems more frequently under a directive issued this week.…

  • October 4th 2022 at 22:26

Microsoft: Watch out for password spray attacks – especially you, Basic Auth

Exchange Online users should have authentication policies in place

Microsoft is warning Exchange Online users about a rise in password spray attacks, urging those that have yet to disable Basic Authentication to at least set up authentication policies to protect their users and data.…

  • October 4th 2022 at 16:15

Japanese sushi chain boss resigns amid accusation of improper data access

Data theft stinks, says victim. Alleged perp claims he's getting a raw deal

The president of casual Japanese chain restaurant Kappa Sushi resigned yesterday in the wake of a data-theft scandal that has rocked the world of sushi trains.…

  • October 4th 2022 at 05:56

Giveaways for every security professional

Don’t chuck money away before you’ve checked SANS free educational content

Sponsored Post Fighting cybercrime is an expensive business. If your cyber defences fail, then the cost can be measured in many ways. There's the price of repairing damaged infrastructure, retrieving lost data, and paying regulatory penalties. And the cost in reputational terms with customers simply has no metric.…

  • October 4th 2022 at 03:00

Atlassian, Microsoft bugs on CISA’s must-patch list after exploitation spree

Some days, security just feels like a total illusion. OK, most days...

A recently disclosed critical vulnerability in Atlassian's Bitbucket is actively being exploited, according to the US government.…

  • October 4th 2022 at 00:31

Online romance scamlord who netted $9.5m jailed for 25 years

Hello, love, I need $32k to fix my oil rig

A man in the US has been jailed for 25 years after using dating websites, email scams, and other online swindles to steal more than $9.5 million from companies and individuals.…

  • October 3rd 2022 at 22:15

From today, America and UK follow new rules on how they can demand your data from each other

Cops and Feds get easier info sharing, Britain benefits most

The Data Access Agreement (DAA), by which the US and UK have agreed how one country can respond to lawful data demands from police and investigators in the other, took effect on Monday.…

  • October 3rd 2022 at 19:11

It's 2058. A quantum computer is just another decade away. Still, you curse Cloudflare

Assuming this Kyber TLS stuff works as expected

Cloudflare is the first major internet infrastructure provider to support post-quantum cryptography for all customers, which, in theory, should protect data if quantum computing ever manages to break today's encryption technologies.…

  • October 3rd 2022 at 18:22

National Cybersecurity Awareness program 18 years on: Don't click that

Technology is addressing many of the cyberthreats, but the human element will always be a factor

If you've ever found yourself in an interminable meeting listening to the CISO ramble on about the important role you play in protecting yourself and the company from cyberthreats, you could probably point an accusatory finger in large part at the National Cybersecurity Awareness Month (NCSAM) program.…

  • October 3rd 2022 at 17:30

FBI: We tracked who was printing secret documents to unmask ex-NSA suspect

Infosec systems designer alleged to have chatted with undercover agent

A 30-year-old ex-NSA employee was accused by the FBI of trying to sell classified US information to a foreign government – after the Feds said they linked him to the printing of secret documents.…

  • October 3rd 2022 at 17:00

Cyber-proofing data in the cloud

How to reduce the risk and impact of ransomware attacks on AWS data and applications

Webinar Ransomware has a longer history than you might imagine. The very first recognized attack was at the World Health Organization in 1989 when the AIDS Trojan was distributed to 20,000 attendees via floppy disc.…

  • October 3rd 2022 at 13:24

Founder of cybersecurity firm Acronis is afraid of his own vacuum cleaner

It is the exponential changes in the course of human history that worry Serg Bell

Acronis founder Serg Bell is afraid of his own vacuum cleaner, he told The Register in Singapore last week.…

  • October 3rd 2022 at 10:46

Between ransomware and month-long engagements, IR teams need a hug – and a nap

Here's what 1,100 incident responders say about their jobs, just in time for NSCAM

Remember the good old days of cyber-incident response, when the job involved digital forensics and lots of stolen credit cards, as opposed to power-grid-breaking malware and multi-million-dollar ransom demands?…

  • October 3rd 2022 at 10:00

Moody's turns up the heat on 'riskiest' sectors for cyberattacks

$22 trillion of global rated debt has 'high' or 'very high' cyber-risk exposure

About $22 trillion of global debt rated by Moody's Investors Service has "high," or "very high" cyber-risk exposure, with electric, gas and water utilities, as well as hospitals, among the sectors facing the highest risk of cyberattacks.…

  • October 3rd 2022 at 06:33

Steganography alert: Backdoor spyware stashed in Microsoft logo

Now that's sticker shock

Internet snoops have been caught concealing spyware in an old Windows logo in an attack on governments in the Middle East.…

  • October 2nd 2022 at 12:56

BlackCat malware lashes out at US defense IT contractor

Also, Amazon's Ring footage TV shows draws criticism, US v Soviet spying docs found, and more

In Brief The BlackCat ransomware gang, also known as ALPHV, has allegedly broken into IT firm NJVC, a provider of services to civilian US government agencies and the Department of Defense.…

  • October 2nd 2022 at 08:47

Gone in a day: Ethical hackers say it would take mere hours to empty your network

300 red teamers walk into a bar…

Once they've broken into an IT environment, most intruders need less than five hours to collect and steal sensitive data, according to a SANS Institute survey of more than 300 ethical hackers. …

  • October 1st 2022 at 09:57

Microsoft warns of North Korean crew posing as LinkedIn recruiters

State-sponsored ZINC allegedly passes on malware-laden open source apps

Microsoft has claimed a North Korean crew poses as LinkedIn recruiters to distribute poisoned versions of open source software packages.…

  • September 30th 2022 at 05:53

Stop us if you've heard this one before: Exchange Server zero-days actively exploited

Remember this next time Microsoft talks about how seriously it takes security

Updated Infosec experts have warned zero-day flaws in Microsoft’s Exchange server are being actively exploited.…

  • September 30th 2022 at 03:03

Ex-eBay execs jailed for cyberstalking web critics

Still to come: Civil RICO lawsuit against e-souk and former top brass

Two now-former eBay executives who pleaded guilty to cyberstalking charges this year have been sent down and fined tens of thousands of dollars.…

  • September 30th 2022 at 00:58

How CIA betrayed informants with shoddy front websites built for covert comms

Top tip, don't give your secret login box the HTML form type 'password'

For almost a decade, the US Central Intelligence Agency communicated with informants abroad using a network of websites with hidden communications capabilities.…

  • September 29th 2022 at 23:03
❌