15 Jan

Ransomware protection deconstructed

Sponsored Post Rubrik has combed through its archive to find what it judges to be the top 12 must-see demos of its products available to

Author rabih
15 Jan

China loathes AirDrop so much it’s publicized an old flaw in Apple’s P2P protocol

In June 2023 China made a typically bombastic announcement: operators of short-distance ad hoc networks must ensure they run according to proper socialist principles, and

Author rabih
13 Jan

Number of orgs compromised via Ivanti VPN zero-days grows as Mandiant weighs in

Two zero-day bugs in Ivanti products were likely under attack by cyberspies as early as December, according to Mandiant’s threat intel team. The software biz

Author rabih
13 Jan

Why we update… Data-thief malware exploits SmartScreen on unpatched Windows PCs

Criminals are exploiting a Windows Defender SmartScreen bypass vulnerability to infect PCs with Phemedrone Stealer, a malware strain that scans machines for sensitive information –

Author rabih
12 Jan

Exploit for under-siege SharePoint vuln reportedly in hands of ransomware crew

Security experts claim ransomware criminals have got their hands on a functional exploit for a nearly year-old critical Microsoft SharePoint vulnerability that was this week

Author rabih
12 Jan

Secret multimillion-dollar cryptojacker snared by Ukrainian police

The criminal thought to be behind a multimillion-dollar cryptojacking scheme is in custody following a Europol-led investigation. Supported by the National Police of Ukraine, Europol

Author rabih
12 Jan

Secure network operations for hybrid working

Webinar Remote working has rapidly become the norm for many organizations and isn’t ever going away. But it still needs to be secure if it’s

Author rabih
12 Jan

Lessons from SEC’s X account hack – Week in security with Tony Anscombe

Video The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC’s X account

Author rabih
12 Jan

So, are we going to talk about how GitHub is an absolute boon for malware, or nah?

The popularity of Github has made it too big to block, which is a boon to dissidents ducking government censors but a problem for internet

Author rabih
12 Jan

Data regulator fines HelloFresh £140k for sending 80M+ spams

Food delivery company HelloFresh is nursing a £140,000 ($178k) fine by Britain’s data privacy watchdog after a probe found it had dispatched upwards of a

Author rabih
12 Jan

While we fire the boss, can you lock him out of the network?

On Call Welcome once more, dear reader, to On Call, The Register‘s weekly reader-contributed column detailing the delights and dangers of working in tech support.

Author rabih
12 Jan

Drivers: We’ll take that plain dumb car over a flashy data-spilling internet one, thanks

CES Despite all the buzz around internet-connected smart cars at this year’s CES in Las Vegas, most folks don’t want vehicle manufacturers sharing their personal

Author rabih
12 Jan

No, Taylor Swift Won’t Send You a Free Dutch Oven — The New AI Cloning Scam

Taylor Swift wants plenty of good things for her fans — but a free Dutch oven isn’t one of them.   A new scam has cropped

Author rabih
11 Jan

eBay to cough up $3M after cyber-stalking couple who dared criticize the souk

eBay will pay $3 million to settle criminal charges that its security team stalked and harassed a Massachusetts couple in retaliation for their website’s critical

Author rabih
11 Jan

Mandiant’s brute-forced X account exposes perils of skimping on 2FA

Google-owned security house Mandiant’s investigation into how its X account was taken over to push cryptocurrency scams concludes the “likely” cause was a successful brute-force

Author rabih
11 Jan

Infoseccers think attackers backed by China are behind Ivanti zero-day exploits

Security experts believe Chinese nation-state attackers are actively exploiting two zero-day vulnerabilities in security products made by Ivanti. If you’re an admin or a user

Author rabih
11 Jan

Journey into the Immersive Frontier: Preliminary NIST Research on Cybersecurity and Privacy Standards for Immersive Technologies

Words like “metaverse” and “augmented reality” may conjure up thoughts of friends in headsets wielding virtual sabers or folks roaming the streets at night in

Author rabih
11 Jan

A peek behind the curtain: How are sock puppet accounts used in OSINT?

Business Security How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks Mario Micucci 11 Jan

Author rabih
Load moreLoadingAll items loaded