The Register
Volunteer DEF CON hackers dive into America's leaky water infrastructure
A plan for hackers to help secure America's critical infrastructure has kicked off with six US water companies signing up to let coders kick the tires of their computer systems and fix any vulnerabilities.…
Trump taps border hawk to head DHS. Will Noem's 'enthusiasm' extend to digital domain?
Analysis President-elect Donald Trump has announced several unorthodox nominations for his cabinet over the last two weeks, including South Dakota Governor Kristi Noem, whom he tapped to serve as Homeland Security Secretary. …
Andrew Tate's site ransacked, subscriber data stolen
The website of self-proclaimed misogynist and alleged sex trafficker and rapist Andrew Tate has been compromised and data on its paying subscribers stolen.…
1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole
Thousands of Palo Alto Networks firewalls were compromised by attackers exploiting two recently patched security bugs. The intruders were able to deploy web-accessible backdoors to remotely control the equipment as well as cryptocurrency miners and other malware.…
How to master endpoint security
Webinar Want to access the key takeaways from the recent "Secure Everything for Every Endpoint" webinar?…
SafePay ransomware gang claims Microlise attack that disrupted prison van tracking
The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its extortion demands before leaking data.…
Helpline for Yakuza victims fears it leaked their personal info
A local Japanese government agency dedicated to preventing organized crime has apologized after experiencing an incident it fears may have led to a leak of personal information describing 2,500 people who reached out to it for consultation.…
Here's what happens if you don't layer network security – or remove unused web shells
The US Cybersecurity and Infrastructure Agency often breaks into critical organizations' networks – with their permission, of course – to simulate real-world cyber attacks and thereby help improve their security. In one of those recent exercises conducted at a critical infrastructure provider, the Agency exploited a web shell left behind from an earlier bug bounty program, scooped up a bunch of credentials and security keys, moved through the network and ultimately pwned the org's domain and several sensitive business system targets.…
DARPA-backed voting system for soldiers abroad savaged
An electronic voting project backed by DARPA – Uncle Sam's boffinry nerve center – to improve the process of absentee voting for American military personnel stationed abroad has been slammed by security researchers.…
Chinese ship casts shadow over Baltic subsea cable snipfest
The Danish military has confirmed it is tracking a Chinese ship that is under investigation after two optical fiber internet cables under the Baltic Sea were damaged.…
'Alarming' bugs lay low in Ubuntu Server utility for 10 years
Researchers at Qualys refuse to release exploit code for five bugs in Ubuntu Server's needrestart utility that allow unprivileged attackers to gain root access without any user interaction.…
Now Online Safety Act is law, UK has 'priorities' – but still won't explain 'spy clause'
The UK government has set out plans detailing how it will use the new law it has created to control online platforms and social media – with one telling exception.…
Put your usernames and passwords in your will, advises Japan's government
Japan's National Consumer Affairs Center on Wednesday suggested citizens start "digital end of life planning" and offered tips on how to do it.…
Five Scattered Spider suspects indicted for phishing spree and crypto heists
The US Department of Justice has issued an indictment that names five people accused of stealing millions in cryptocurrency – and we are told they are suspected members of cyber-gang Scattered Spider.…
Chinese cyberspies, Musk’s Beijing ties, labelled ‘real risk’ to US security by senator
A senior US senator has warned that American tech companies’ activities in China represent a national security risk, in a hearing that saw infosec biz CrowdStrike testify it has identified another cyber-espionage crew it believes is backed by Beijing.…
Mega US healthcare payments network restores system 9 months after ransomware attack
Still reeling from its February ransomware attack, Change Healthcare confirms its clearinghouse services are back up and running, almost exactly nine months since the digital disruption began.…
Google's AI bug hunters sniff out two dozen-plus code gremlins that humans missed
Google's OSS-Fuzz project, which uses large language models (LLMs) to help find bugs in code repositories, has now helped identify 26 vulnerabilities, including a critical flaw in the widely used OpenSSL library.…
D-Link tells users to trash old VPN routers over bug too dangerous to identify
Owners of older models of D-Link VPN routers are being told to retire and replace their devices following the disclosure of a serious remote code execution (RCE) vulnerability.…
Data is the new uranium – incredibly powerful and amazingly dangerous
I recently got to play a 'fly on the wall' at a roundtable of chief information security officers. Beyond the expected griping and moaning about funding shortfalls and always-too-gullible users, I began to hear a new note: data has become a problem.…
Healthcare org Equinox notifies 21K patients and staff of data theft
Equinox, a New York State health and human services organization, has begun notifying over 21 thousand clients and staff that cyber criminals stole their health, financial, and personal information in a "data security incident" nearly seven months ago.…