The Register
Axiom Space aims for orbit with its Orbital Data Center Node
Axiom Space and Spacebilt have announced plans to add optically interconnected Orbital Data Center (ODC) infrastructure to the International Space Station (ISS).…
BreachForums kingpin goes from walk-free deal to 3-year stretch
The founder of the popular cybercrime website BreachForums will spend three years in prison after previously being let off with a slap on the wrist.…
UK telco Colt’s recovery from August cyberattack pushes into November
Brit telco Colt Technology Services says its recovery from an August cyberattack might not be completed until late November.…
UEFI Secure Boot for Linux Arm64 – where do we stand?
Arm devices are everywhere today and many of them run Linux. The operating system also powers cloud computing and IT environments all over the world. However, x86 is still the dominant architecture of global computer hardware, where the Unified Extensible Firmware Interface (UEFI) with Secure Boot incorporated is a standard. But what does UEFI look like from an Arm perspective?…
Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack
Researchers from Google and Swiss university ETH Zurich have found a new class of Rowhammer vulnerability that could allow attackers to access info stored in DDR5 memory.…
Australia to let Big Tech choose its own adventure to enact kids social media ban
Australia’s eSafety commissioner has told social media operators it expects them to employ multiple age assurance techniques and technologies to keep children under sixteen off social media, as required by local law from December 10th.…
Microsoft blocks bait for ‘fastest-growing’ 365 phish kit, seizes 338 domains
Microsoft has seized 338 websites associated with RaccoonO365 and identified the leader of the phishing service - Joshua Ogundipe - as part of a larger effort to disrupt what Redmond's Digital Crimes Unit calls the "fastest-growing tool used by cybercriminals to steal Microsoft 365 usernames and passwords."…
Criminals broke into the system Google uses to share info with cops
Google confirmed that miscreants created a fraudulent account in its Law Enforcement Request System (LERS) portal, which police and other government agencies use to ask for data about Google users.…
Apple 0-day likely used in spy attacks affected devices as old as iPhone 8
Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in what the company calls "extremely sophisticated" attacks.…
Self-propagating worm fuels latest npm supply chain compromise
The npm platform is the target of another supply chain attack, with crims already compromising 187 packages and counting.…
'FileFix' attacks use fake Facebook security alerts to trick victims into running infostealers
An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC infostealer and malware downloader.…
JLR stuck in neutral as losses skyrocket amid cyberattack cleanup
Jaguar Land Rover (JLR) has announced a further extension to its multi-site global shutdown, bringing its cyber-related downtime to nearly four weeks.…
China slaps 1-hour deadline on reporting serious cyber incidents
Beijing will soon expect Chinese network operators to 'fess up to serious cyber incidents within an hour of spotting them – or risk penalties for dragging their feet.…
Careless engineer stored recovery codes in plaintext, got whole org pwned
Failing to encrypt sensitive data leaves you wide open to attack. During the recent SonicWall attack spree, intruders bypassed multi-factor authentication (MFA) in at least one case, because a user's recovery codes were left sitting in a plaintext file on their desktop.…
Security begins with visibility: How IGA brings hidden access risks to light
Partner Content From the moment users log onto their machines, access rights shape their experience. Access rights determine which apps they can run, which directories they can open, and what information they can retrieve.…
Former FinWise employee may have accessed nearly 700K customer records
A US fintech biz is writing to nearly 700,000 customers because a former employee may have accessed or acquired their data after leaving the company.…
Nork snoops whip up fake South Korean military ID with help from ChatGPT
North Korean spies used ChatGPT to generate a fake military ID for use in an espionage campaign against a South Korean defense-related institution, according to new research.…
China turns the screws on Nvidia with antitrust probe
China has dealt Nvidia another blow, finding the chipmaker in violation of the country's anti-monopoly Law and escalating a long-running regulatory headache into a full investigation.…
Jaguar Land Rover supply chain workers must get Covid-style support, says union
The UK's chief automotive workers' union is calling on the government to establish a Covid-esque furlough scheme for the thousands of individuals who face losing their jobs due to the cyber-related downtime at Jaguar Land Rover.…
UK Lords take aim at Ofcom's 'child-protection' upgrades to Online Safety Act
The House of Lords is about to put the latest child-protection plans of UK regulator the Office of Communications (Ofcom) under the microscope.…