Normal view

There are new articles available, click to refresh the page.
Today — 18 May 2024Main stream

Gawd, after that week, we wonder what’s next for China and the Western world – Source: go.theregister.com

gawd,-after-that-week,-we-wonder-what’s-next-for-china-and-the-western-world-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Kettle It’s been a fairly troubling week in terms of the relationship between China and the Western world. Chiefly, America announced stiff import tariffs on Chinese-made tech, Microsoft gave key engineering and cloud staff the opportunity to get out of China while they still can, and the UK signaled […]

La entrada Gawd, after that week, we wonder what’s next for China and the Western world – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

How two brothers allegedly swiped $25M in a 12-second Ethereum heist – Source: go.theregister.com

how-two-brothers-allegedly-swiped-$25m-in-a-12-second-ethereum-heist-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register The US Department of Justice has booked two brothers on allegations that they exploited open source software used in the Ethereum blockchain world to bag $25 million (£20 million). The pair – computer scientists Anton, 24, of Boston, and James Pepaire-Bueno, 28, of New York – are accused of […]

La entrada How two brothers allegedly swiped $25M in a 12-second Ethereum heist – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Aussie cops probe MediSecure’s ‘large-scale ransomware data breach’ – Source: go.theregister.com

aussie-cops-probe-medisecure’s-‘large-scale-ransomware-data-breach’-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Australian prescriptions provider MediSecure is the latest healthcare org to fall victim to a ransomware attack, with crooks apparently stealing patients’ personal and health data. “While we continue to gather more information, early indicators suggest the incident originated from one of our third-party vendors,” the e-script provider said in […]

La entrada Aussie cops probe MediSecure’s ‘large-scale ransomware data breach’ – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Three cuffed for ‘helping North Koreans’ secure remote IT jobs in America – Source: go.theregister.com

three-cuffed-for-‘helping-north-koreans’-secure-remote-it-jobs-in-america-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Three individuals accused of helping North Korea fund its weapons programs using US money are now in handcuffs. All three are said by Uncle Sam’s prosecutors to have used different methods to evade sanctions against the hermit nation and extract money from America’s economy to benefit the Kim Jong-Un […]

La entrada Three cuffed for ‘helping North Koreans’ secure remote IT jobs in America – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

First LockBit, now BreachForums: Are cops winning the war or just a few battles? – Source: go.theregister.com

first-lockbit,-now-breachforums:-are-cops-winning-the-war-or-just-a-few-battles?-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Interview On Wednesday the FBI and international cops celebrated yet another cybercrime takedown – of ransomware brokerage site BreachForums – just a week after doxing and imposing sanctions on the LockBit ransomware crew’s kingpin, and two months after compromising the gang’s website. While the BreachForums shutdown didn’t have quite […]

La entrada First LockBit, now BreachForums: Are cops winning the war or just a few battles? – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware – Source: go.theregister.com

crims-abusing-microsoft-quick-assist-to-deploy-black-basta-ransomware-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register A cybercrime gang has been abusing Microsoft’s Quick Assist application in social engineering attacks that ultimately allow the crew to infect victims with Black Basta ransomware. This, according to Redmond, which said the campaign has been ongoing since mid-April, and blamed a financially motivated group it tracks as Storm-1811 […]

La entrada Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Before yesterdayMain stream

Improving cyber defense with open source SIEM and XDR – Source: go.theregister.com

improving-cyber-defense-with-open-source-siem-and-xdr-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Partner Content A cyber defense strategy outlines policies, procedures, and technologies to prevent, detect, and respond to cyber attacks. This helps avoid financial loss, reputational damage, and legal repercussions. Developing a cyber defense strategy involves evaluating business risks, implementing security controls and policies, and continuously improving them to address […]

La entrada Improving cyber defense with open source SIEM and XDR – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Microsoft fixes a bug abused in QakBot attacks plus a second under exploit – Source: go.theregister.com

microsoft-fixes-a-bug-abused-in-qakbot-attacks-plus-a-second-under-exploit-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Happy May Patch Tuesday. We’ve got a lot of vendors joining this month’s patchapalooza, which includes a handful of bugs that have been exploited — either in the wild or at Pwn2Own — and now fixed by Microsoft, Apple, Google and VMware. Starting with Microsoft: Redmond disclosed and fixed […]

La entrada Microsoft fixes a bug abused in QakBot attacks plus a second under exploit – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

FCC names and shames Royal Tiger AI robocall crew – Source: go.theregister.com

fcc-names-and-shames-royal-tiger-ai-robocall-crew-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register The US Federal Communications Commission has named its first robocall gang, dubbing the crew “Royal Tiger,” and detailed its operations in an attempt to encourage international action against the scammers. Royal Tiger uses AI voice cloning to impersonate staff at government agencies, banks, and utilities. These robocalls purport to […]

La entrada FCC names and shames Royal Tiger AI robocall crew – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Cybersec chiefs team up with insurers to say ‘no’ to ransomware bullies – Source: go.theregister.com

cybersec-chiefs-team-up-with-insurers-to-say-‘no’-to-ransomware-bullies-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register The latest effort to reduce the number of ransom payments sent to cybercriminals in the UK involves the country’s National Cyber Security Centre (NCSC) locking arms with insurance associations. Announced today by NCSC CEO Felicity Oswald at the annual CYBERUK conference, a new guidance book aims to prevent organizations […]

La entrada Cybersec chiefs team up with insurers to say ‘no’ to ransomware bullies – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Telegram CEO calls out rival Signal, claiming it has ties to US government – Source: go.theregister.com

telegram-ceo-calls-out-rival-signal,-claiming-it-has-ties-to-us-government-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Telegram CEO Pavel Durov issued a scathing criticism of Signal, alleging the messaging service is not secure and has ties to US intelligence agencies. There is no evidence Signal is hooked into the US government as described by Durov. Durov made his remarks on his Telegram channel on Wednesday, […]

La entrada Telegram CEO calls out rival Signal, claiming it has ties to US government – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Google, Apple gear to raise tracking tag stalker alarm – Source: go.theregister.com

google,-apple-gear-to-raise-tracking-tag-stalker-alarm-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Google and Apple are rolling out an anti-stalking feature for Android 6.0+ and iOS 17.5 that will issue an alert if some scumbag is using a gadget like an AirTag or similar to clandestinely track the user. Basically, if someone places a hidden tracking tag in your bag, car, […]

La entrada Google, Apple gear to raise tracking tag stalker alarm – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Visualize your critical cyber risks – Source: go.theregister.com

visualize-your-critical-cyber-risks-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Sponsored Post Defending against the cyber threats of today isn’t dissimilar to protecting a medieval castle from attack a thousand years ago. That’s the opinion of Chris Cheyne, SOC Director at SecurityHQ, a managed security services provider (MSSP), who claims that breaking risks down into their component parts and […]

La entrada Visualize your critical cyber risks – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

NHS Digital hints at exploit sightings of Arcserve UDP vulnerabilities – Source: go.theregister.com

nhs-digital-hints-at-exploit-sightings-of-arcserve-udp-vulnerabilities-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register The UK’s NHS is warning of the possibility that vulnerabilities in Arcserve Unified Data Protection (UDP) software are being actively exploited. Originally disclosed in March, the three vulnerabilities all had proof of concept (PoC) exploit code released the day after disclosure by Tenable, which reported the bugs to Arcserve. […]

La entrada NHS Digital hints at exploit sightings of Arcserve UDP vulnerabilities – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Ransomware negotiator weighs in on the extortion payment debate with El Reg – Source: go.theregister.com

ransomware-negotiator-weighs-in-on-the-extortion-payment-debate-with-el-reg-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Interview Ransomware hit an all-time high last year, with more than 60 criminal gangs listing at least 4,500 victims – and these infections don’t show any signs of slowing. Drew Schmitt is a professional ransomware negotiator and practice lead for the GuidePoint Research and Intelligence Team or GRIT — […]

La entrada Ransomware negotiator weighs in on the extortion payment debate with El Reg – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Critical infrastructure security will stay poor until everyone pulls together – Source: go.theregister.com

critical-infrastructure-security-will-stay-poor-until-everyone-pulls-together-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Interview Take a glance at the cybersecurity headlines of late, and you’ll see a familiar phrase that keeps cropping up: Critical infrastructure.  The power lines, internet cables, water control systems, and other critical technology that keeps a country running are being prodded and attacked physically and digitally lately – […]

La entrada Critical infrastructure security will stay poor until everyone pulls together – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Iran most likely to launch destructive cyber-attack against US – ex-Air Force intel analyst – Source: go.theregister.com

iran-most-likely-to-launch-destructive-cyber-attack-against-us-–-ex-air-force-intel-analyst-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Interview China remains the biggest cyber threat to the US government, America’s critical infrastructure, and its private-sector networks, the nation’s intelligence community has assessed. This is probably not all that shocking to anyone paying attention to recent headlines warning of Beijing’s cyber-snoops burrowing into energy facilities, emergency responder networks, […]

La entrada Iran most likely to launch destructive cyber-attack against US – ex-Air Force intel analyst – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Cybercriminals hit jackpot as 500k+ Ohio Lottery lovers lose out on their personal data – Source: go.theregister.com

cybercriminals-hit-jackpot-as-500k+-ohio-lottery-lovers-lose-out-on-their-personal-data-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register More than half a million gamblers with a penchant for powerballs will be receiving some fairly unwelcome news very soon, if not already, as cybercriminals have made off with their personal data. That’s according to Ohio Lottery, which has this week finally revealed the scale of its Christmas Eve […]

La entrada Cybercriminals hit jackpot as 500k+ Ohio Lottery lovers lose out on their personal data – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Microsoft’s Brad Smith summoned by Homeland Security committee over ‘cascade’ of infosec failures – Source: go.theregister.com

microsoft’s-brad-smith-summoned-by-homeland-security-committee-over-‘cascade’-of-infosec-failures-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register The US government wants to make Microsoft’s vice chair and president, Brad Smith, the latest tech figurehead to field questions from a House committee on its recent cybersecurity failings. The House Committee on Homeland Security has proposed the hearing take place later this month on May 22. It will […]

La entrada Microsoft’s Brad Smith summoned by Homeland Security committee over ‘cascade’ of infosec failures – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

GhostStripe attack haunts self-driving cars by making them ignore road signs – Source: go.theregister.com

ghoststripe-attack-haunts-self-driving-cars-by-making-them-ignore-road-signs-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Six boffins mostly hailing from Singapore-based universities say they can prove it’s possible to interfere with autonomous vehicles by exploiting the machines’ reliance on camera-based computer vision and cause them to not recognize road signs. The technique, dubbed GhostStripe [PDF] in a paper to be presented at the ACM […]

La entrada GhostStripe attack haunts self-driving cars by making them ignore road signs – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

‘Four horsemen of cyber’ look back on 2008 DoD IT breach that led to US Cyber Command – Source: go.theregister.com

‘four-horsemen-of-cyber’-look-back-on-2008-dod-it-breach-that-led-to-us-cyber-command-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register RSAC A malware-laced USB stick, inserted into a military laptop at a base in Afghanistan in 2008, led to what has been called the worst military breach in US history, and to the creation of the US Cyber Command. The laptop was attached to the Department of Defense’s Central […]

La entrada ‘Four horsemen of cyber’ look back on 2008 DoD IT breach that led to US Cyber Command – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

❌
❌