The Register
Insider steals 79,000 email addresses at work to promote own business
A former council staff member in the district where William Shakespeare was born ransacked databases filled with residents' information to help drum up new business for their outside venture.…
Two days into the Digital Services Act, EU wields it to deepen TikTok probe
Two days after its Digital Services Act (DSA) came into effect, the European Union used it to open an investigation into made-in-China social network TikTok.…
Vietnam to collect biometrics - even DNA - for new ID cards
The Vietnamese government will begin collecting biometric information from its citizens for identification purposes beginning in July this year.…
LockBit ransomware gang disrupted by global operation
Notorious ransomware gang LockBit's website has been taken over by law enforcement authorities, who claim they have disrupted the group's operations and will soon reveal the extent of an operation against the group.…
ALPHV gang claims it's the attacker that broke into Prudential Financial, LoanDepot
The ALPHV/BlackCat ransomware group is claiming responsibility for attacks on both Prudential Financial and LoanDepot, making a series of follow-on allegations against them.…
Safeguarding cyber-physical systems for a smart future
Sponsored Feature Cyber-physical systems (CPS) have a vital role to play in our increasingly connected world.…
Feds post $15 million bounty for info on ALPHV/Blackcat ransomware crew
infosec in brief The US government is offering bounties up to $15 million as a reward for anyone willing to help it take out the APLHV/Blackcat ransomware gang.…
Election security threats in 2024 range from AI to … anthrax?
In time for the long Presidents' Day weekend in the US there have been multiple warnings about what will undoubtedly be a challenging and potentially dangerous year for voting processes and government workers.…
How to weaponize LLMs to auto-hijack websites
AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that enable automated interaction with other systems, they can act on their own as malicious agents.…
Google open sources file-identifying Magika AI for malware hunters and others
Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims to give IT network defenders and others better automated tools.…
Zeus, IcedID malware kingpin faces 40 years in slammer
A Ukrainian cybercrime kingpin who ran some of the most pervasive malware operations faces 40 years in prison after spending nearly a decade on the FBI's Cyber Most Wanted List.…
Cutting kids off from the dark web – the solution can only ever be social
The murder of 16-year-old schoolgirl Brianna Ghey has kickstarted a debate around limiting children's access to the dark web in the UK, with experts highlighting the difficulty in achieving this.…
Quest Diagnostics pays $5M after mixing patient medical data with hazardous waste
Quest Diagnostics has agreed to pay almost $5 million to settle allegations it illegally dumped protected health information – and hazardous waste – at its facilities across California.…
Feds dismantle Russian GRU botnet built on 1,000-plus home, small biz routers
The US government today said it disrupted a botnet that Russia's GRU military intelligence unit used for phishing expeditions, spying, credential harvesting, and data theft against American and foreign governments and other strategic targets.…
Pentagon launches nuke-spotting satellites amid Russian space bomb rumors
Last night's launch of six Pentagon missile-detection satellites was well timed as fears mount that Russia is considering putting nuclear weapons into space.…
Mitigating AI security risks
Webinar It has become possible to swiftly and inexpensively train, validate and deploy AI models and applications, yet while we embrace innovation, are we aware of the security risks?…
Zoom stomps critical privilege escalation bug plus 6 other flaws
Video conferencing giant Zoom today opened up about a fresh batch of security vulnerabilities affecting its products, including a critical privilege escalation flaw.…
Cybercriminals are stealing Face ID scans to break into mobile banking accounts
Cybercriminals are targeting iOS users with malware that steals Face ID scans to break into and pilfer money from bank accounts – thought to be a world first.…
Miscreants turn to ad tech to measure malware metrics
Cyber baddies have turned to ad networks to measure malware deployment and to avoid detection, according to HP Wolf Security.…
European Court of Human Rights declares backdoored encryption is illegal
The European Court of Human Rights (ECHR) has ruled that laws requiring crippled encryption and extensive data retention violate the European Convention on Human Rights – a decision that may derail European data surveillance legislation known as Chat Control.…