The Register
Self-propagating worm fuels latest npm supply chain compromise
The npm platform is the target of another supply chain attack, with crims already compromising 187 packages and counting.…
'FileFix' attacks use fake Facebook security alerts to trick victims into running infostealers
An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC infostealer and malware downloader.…
JLR stuck in neutral as losses skyrocket amid cyberattack cleanup
Jaguar Land Rover (JLR) has announced a further extension to its multi-site global shutdown, bringing its cyber-related downtime to nearly four weeks.…
China slaps 1-hour deadline on reporting serious cyber incidents
Beijing will soon expect Chinese network operators to 'fess up to serious cyber incidents within an hour of spotting them – or risk penalties for dragging their feet.…
Careless engineer stored recovery codes in plaintext, got whole org pwned
Failing to encrypt sensitive data leaves you wide open to attack. During the recent SonicWall attack spree, intruders bypassed multi-factor authentication (MFA) in at least one case, because a user's recovery codes were left sitting in a plaintext file on their desktop.…
Security begins with visibility: How IGA brings hidden access risks to light
Partner Content From the moment users log onto their machines, access rights shape their experience. Access rights determine which apps they can run, which directories they can open, and what information they can retrieve.…
Former FinWise employee may have accessed nearly 700K customer records
A US fintech biz is writing to nearly 700,000 customers because a former employee may have accessed or acquired their data after leaving the company.…
Nork snoops whip up fake South Korean military ID with help from ChatGPT
North Korean spies used ChatGPT to generate a fake military ID for use in an espionage campaign against a South Korean defense-related institution, according to new research.…
China turns the screws on Nvidia with antitrust probe
China has dealt Nvidia another blow, finding the chipmaker in violation of the country's anti-monopoly Law and escalating a long-running regulatory headache into a full investigation.…
Jaguar Land Rover supply chain workers must get Covid-style support, says union
The UK's chief automotive workers' union is calling on the government to establish a Covid-esque furlough scheme for the thousands of individuals who face losing their jobs due to the cyber-related downtime at Jaguar Land Rover.…
UK Lords take aim at Ofcom's 'child-protection' upgrades to Online Safety Act
The House of Lords is about to put the latest child-protection plans of UK regulator the Office of Communications (Ofcom) under the microscope.…
Cyber-scam camp operators shift operations to vulnerable countries as sanctions strike
Criminals appear to be moving cyber-scam centers to vulnerable countries.…
15 ransomware gangs ‘go dark’ to enjoy 'golden parachutes'
Infosec In Brief 15 ransomware gangs, including Scattered Spider and Lapsus$, have announced that they are going dark, and say no more attacks will be carried out in their name.…
Data destruction done wrong could cost your company millions
With the end of Windows 10's regular support cycle fast approaching, and a good five years since the COVID pandemic spurred a wave of hardware replacements to support remote work, many IT departments are in the process of refreshing their fleets. But what they do with decommissioned systems is just as important as the shiny new ones they buy.…
HybridPetya: More proof that Secure Boot bypasses are not just an urban legend
A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows systems, making it the fourth publicly known bootkit capable of punching through the feature and hijacking a PC before the operating system loads.…
Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages
Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow remote code execution on affected devices.…
All your vulns are belong to us! CISA wants to maintain gov control of CVE program
The Cybersecurity and Infrastructure Security Agency (CISA) nearly let the Common Vulnerabilities and Exposures (CVE) program lapse earlier this year, but a new "vision" document it released this week signals that it now wants more control over the global standard for vulnerability identification.…
1,200 undergrads hung out to dry after jailbreak attack on laundry machines
More than a thousand university students in the Netherlands must continue to travel to wash their clothes after their building management company failed to bring its borked smart laundry machines back online.…
Privacy activists warn digital ID won’t stop small boats – but will enable mass surveillance
A national digital ID could hand the government the tools for population-wide surveillance – and if history is anything to go by, ministers probably couldn't run it without cocking it up.…
Hack to school: Parents told to keep their little script kiddies in line
The UK's data protection watchdog says more than half of cyberattacks in schools are caused by students, and that parents should act early to prevent their offspring from falling into the wrong crowds.…