02 Oct

The fix for BGP’s weaknesses has big, scary, issues of its own, boffins find

The Resource Public Key Infrastructure (RPKI) protocol has “software vulnerabilities, inconsistent specifications, and operational challenges” according to a pre-press paper from a trio of German

Author rabih
01 Oct

Euro cops arrest 4 including suspected LockBit dev chilling on holiday

Building on the success of what’s known around here as LockBit Leak Week in February, the authorities say they’ve arrested a further four individuals with

Author rabih
01 Oct

Evil Corp’s deep ties with Russia and NATO member attacks exposed

The relationship between infamous cybercrime outfit Evil Corp and the Russian state is thought to be extraordinarily close, so close that intelligence officials allegedly ordered

Author rabih
01 Oct

NCA unmasks man it suspects is both ‘Evil Corp kingpin’ and LockBit affiliate

The latest installment of the National Crime Agency’s (NCA) series of ransomware revelations from February’s LockBit Leak Week emerges today as the agency identifies a

Author rabih
01 Oct

Why system resilience should mainly be the job of the OS, not just third-party applications

Business Security Building efficient recovery options will drive ecosystem resilience Tony Anscombe 01 Oct 2024  •  , 4 min. read Last week, a US congressional

Author rabih
01 Oct

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month, called ‘Staff Stories Spotlight.’ Throughout the month

Author rabih
01 Oct

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Digital Security Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices Tony Anscombe 01 Oct 2024  • 

Author rabih
01 Oct

Rackspace internal monitoring web servers hit by zero-day

Exclusive Rackspace has told customers intruders exploited a zero-day bug in a third-party application it was using, and abused that vulnerability to break into its

Author rabih
01 Oct

Rackspace monitoring systems rocked by zero-day

Exclusive Rackspace has told customers intruders exploited a zero-day bug in a third-party application it was using, and abused that vulnerability to break into its

Author rabih
01 Oct

Australian e-tailer digiDirect customers’ info allegedly stolen and dumped online

Data allegedly belonging to more than 304,000 customers of Australian camera and tech e-tailer digiDirect has been leaked to an online cyber crime forum. digiDirect,

Author rabih
30 Sep

Rackspace monitoring systems hit by zero-day

Exclusive Rackspace has told customers intruders exploited a zero-day bug in a third-party application it was using, and abused that vulnerability to break into its

Author rabih
30 Sep

Ransomware forces hospital to turn away ambulances

Ransomware scumbags have caused a vital hospital to turn away ambulances after infecting its computer systems with malware. The University Medical Center in Lubbock, west

Author rabih
30 Sep

T-Mobile US to cough up $31.5M after that long string of security SNAFUs

T-Mobile US has agreed to fork out $31.5 million to improve its cybersecurity and pay a fine after a string of network intrusions affected millions

Author rabih
30 Sep

Forget the Kia Boyz: Crooks could hijack your car with just a smartphone

Infosec In Brief Put away that screwdriver and USB charging cable – the latest way to steal a Kia just requires a cellphone and the

Author rabih
30 Sep

If you’re holding important data, Iran is probably trying spearphish it

US and UK national security agencies are jointly warning about Iranian spearphishing campaigns, which remain an ongoing threat to various industries and governments. A security

Author rabih
30 Sep

Remote ID verification tech is often biased, bungling, and no good on its own

A study by the US General Services Administration (GSA) has revealed that five remote identity verification (RiDV) technologies are unreliable, inconsistent, and marred by bias

Author rabih
30 Sep

Cloud threats have execs the most freaked out because they’re not prepared

Efficiency and scalability are key benefits of enterprise cloud computing, but they come at a cost. Security threats specific to cloud environments are the leading

Author rabih
30 Sep

AI code helpers just can’t stop inventing package names

AI models just can’t seem to stop making things up. As two recent studies point out, that proclivity underscores prior warnings not to rely on

Author rabih
Load moreLoadingAll items loaded