22 Oct

Pixel perfect Ghostpulse malware loader hides inside PNG image files

The Ghostpulse malware strain now retrieves its main payload via a PNG image file’s pixels. This development, security experts say, is “one of the most

Author rabih
21 Oct

China’s Spamouflage cranks up trolling of US Senator Rubio as election day looms

China’s Spamouflage disinformation crew has been targeting US Senator Marco Rubio (R-Florida) with its fake news campaigns over the past couple of months, trolling the

Author rabih
21 Oct

Sophos to snatch Secureworks in $859M buyout: Why fight when you can just buy?

British security biz Sophos has announced a plan to gobble up competitor Secureworks in an $859 million deal that will make Dell happy. The server

Author rabih
21 Oct

The billionaire behind Trump’s ‘unhackable’ phone is on a mission to fight Tesla’s FSD

Interview This month, presidential hopeful Donald Trump got a tool in his arsenal, some allegedly “unhackable” communications kit, and The Register has talked to the

Author rabih
21 Oct

macOS HM Surf vuln might already be under exploit by major malware family

In revealing details about a vulnerability that threatens the privacy of Apple fans, Microsoft urges all macOS users to update their systems. The bug, tracked

Author rabih
21 Oct

Google Voice scams: What are they and how do I avoid them?

Scams Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers Phil Muncaster 21

Author rabih
21 Oct

Tesla, Intel, deny they’re the foreign company China just accused of making maps that threaten national security

Tesla has denied it was involved in illegal-map making activities in China after Beijing asserted an unnamed foreign firm working on a smart car project

Author rabih
21 Oct

Internet Archive exposed again – this time through Zendesk

Despite the Internet Archive’s assurances it’s back on its feet after a recent infosec incident, the org still appears to be in trouble after parties

Author rabih
20 Oct

Open source LLM tool primed to sniff out Python zero-days

Researchers with Seattle-based Protect AI plan to release a free, open source tool that can find zero-day vulnerabilities in Python codebases with the help of

Author rabih
18 Oct

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites

in brief A critical security update for the near-ubiquitous WordPress plugin Jetpack was released last week. Site administrators should ensure the latest version is installed

Author rabih
18 Oct

Alleged Bitcoin crook faces 5 years after SEC’s X account pwned

An Alabama man faces five years in prison for allegedly attempting to manipulate the price of Bitcoin by pwning the US Securities and Exchange Commission’s

Author rabih
18 Oct

Intel hits back at China’s accusations it bakes in NSA backdoors

Intel has responded to Chinese claims that its chips include security backdoors at the direction of America’s NSA. The accusations were made earlier this week

Author rabih
18 Oct

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

Video The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019

Author rabih
18 Oct

ESET denies it was compromised as Israeli orgs targeted with ‘ESET-branded’ wipers

ESET denies being compromised after an infosec researcher highlighted a wiper campaign that appeared to victims as if it was launched using the Slovak security

Author rabih
18 Oct

Critical default credential in Kubernetes Image Builder allows SSH root access

A critical bug in Kubernetes Image Builder could allow unauthorized SSH access to virtual machines (VMs) thanks to default credentials being included during the image

Author rabih
18 Oct

Intel lightly hits back at China’s accusations it bakes in NSA backdoors

Intel has responded to Chinese claims that its chips include security backdoors at the direction of America’s NSA. The accusations were made earlier this week

Author rabih
18 Oct

Intel robustly refutes China’s accusations it bakes in NSA backdoors

Intel has roundly rebutted Chinese accusations that its chips include security backdoors at the direction of the US National Security Agency (NSA). The accusations were

Author rabih
18 Oct

Biz hired, and fired, a fake North Korean IT worker – then the ransom demands began

It’s a pattern cropping up more and more frequently: a company fills an IT contractor post, not realizing it’s mistakenly hired a North Korean operative.

Author rabih
Load moreLoadingAll items loaded