News
Biden will veto attempts to rip up SEC breach reporting rule
The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission's (SEC) strict data breach reporting rule.…
LockBit shows no remorse for ransomware attack on children's hospital
Ransomware gang LockBit is claiming responsibility for an attack on a Chicago children's hospital in an apparent deviation from its previous policy of not targeting nonprofits.…
Congress told how Chinese attackers plan to incite 'societal chaos' in the US
Chinese attackers are preparing to "wreak havoc" on American infrastructure and "cause societal chaos" in the US, infosec, and law enforcement bosses told a US House committee on Wednesday.…
FBI confirms it issued remote kill command to blow out Volt Typhoon's botnet
China's Volt Typhoon attackers used "hundreds" of outdated Cisco and NetGear routers infected with malware in an attempt to break into US critical infrastructure facilities, according to the Justice Department.…
Ransomware payment rates drop to new low – only 29% of victims are forking over cash
Trusting a ransomware crew to honor a deal isn't the greatest idea, and the world seems to be waking up to that. The number of victims who chose to pay dropped to a new low of 29 percent in the last quarter of 2023.…
Nearly 4-year-old Cisco vuln linked to recent Akira ransomware attacks
Security researchers believe the Akira ransomware group could be exploiting a nearly four-year-old Cisco vulnerability and using it as an entry point into organizations' systems.…
We know nations are going after critical systems, but what happens when crims join in?
Volt Typhoon, the Chinese government-backed cyberspies whose infrastructure was at least partially disrupted by Uncle Sam, has been homing in on other US energy, satellite and telecommunications systems, according to Robert Lee, CEO of security shop Dragos.…
Ivanti releases patches for VPN zero-days, discloses two more high-severity vulns
Ivanti has finally released the first round of patches for vulnerability-stricken Connect Secure and Policy Secure gateways, but in doing so has also found two additional zero-days, one of which is under active exploitation.…
US shorts China's Volt Typhoon crew targeting America's criticals
The US Justice Department and FBI may have scored a win over Chinese state-sponsored snoops trying to break into American critical infrastructure.…
Jenkins jitters as 45,000 servers still vulnerable to RCE attacks after patch released
The number of public-facing installs of Jenkins servers vulnerable to a recently disclosed critical vulnerability is in the tens of thousands.…
Reg story prompts fresh security bulletin, review of Juniper Networks' CVE process
Juniper Networks has disclosed separate vulnerabilities it was previously accused of concealing, and apologized to customers for the error in communication.…
UK biometrics boss bows out, bemoaning bureaucratic blunders
The farewell report written by the UK's biometrics and surveillance commissioner highlights a litany of failings in the Home Office's approach to governing the technology.…
SolarWinds slams SEC lawsuit against it as 'unprecedented' victim blaming
SolarWinds – whose network monitoring software was backdoored by Russian spies so that the biz's customers could be spied upon – has accused America's financial watchdog of seeking to "revictimise the victim" after the agency sued it over the 2020 attack.…
Tesla hacks make big bank at Pwn2Own's first automotive-focused event
Infosec in brief Trend Micro's Zero Day Initiative (ZDI) held its first-ever automotive-focused Pwn2Own event in Tokyo last week, and awarded over $1.3 million to the discoverers of 49 vehicle-related zero day vulnerabilities.…
750 million Indian mobile subscribers' info for sale on dark web
Asia In Brief Indian infosec firm CloudSEK last week claimed it found records describing 750 million Indian mobile network subscribers on the dark web, with two crime gangs offering the trove of data for just $3,000.…
Microsoft sheds some light on Russian email heist – and how to learn from Redmond's mistakes
Microsoft, a week after disclosing that Kremlin-backed spies broke into its network and stole internal emails and files from its executives and staff, has now confirmed the compromised corporate account used in the genesis of the heist didn't even have multi-factor authentication (MFA) enabled. …
Wait, security courses aren't a requirement to graduate with a computer science degree?
Comment There's a line in the latest plea from CISA – the US government's cybersecurity agency – to software developers to do a better job of writing secure code that may make you spit out your coffee.…
Guess the company: Takes your DNA, blames you when criminals steal it, can’t spot a cyberattack for 5 months
Biotech and DNA-collection biz 23andMe, the one that blamed its own customers for the October mega-breach, just admitted it failed to detect any malicious activity for the entire five months attackers were breaking into user accounts.…
Akira ransomware gang says it stole passport scans from Lush in 110 GB data heist
The Akira ransomware gang is claiming responsiblity for the "cybersecurity incident" at British bath bomb merchant.…
Trickbot malware scumbag gets five years for infecting hospitals, businesses
A former Trickbot developer has been sent down for five years and four months for his role in infecting American hospitals and businesses with ransomware and other malware, costing victims tens of millions of dollars in losses.…