The Register
Dept of Defense engineer took home top-secret docs, booked a fishing trip to Mexico – then the FBI showed up
A US Department of Defense electrical engineer has turned his world upside down after printing 155 pages from 20 documents, all of which were marked top secret and classified, from his DoD workspace, brought them home with him – and was collared on his way to Mexico.…
Infoseccers criticize Veeam over critical RCE vulnerability and a failing blacklist
In patching the latest critical remote code execution (RCE) bug in Backup and Replication, software shop Veeam is attracting criticism from researchers for the way it handles uncontrolled deserialization vulnerabilities.…
Too many software supply chain defense bibles? Boffins distill advice
Organizations concerned about software supply chain attacks should focus on role-based access control, system monitoring, and boundary protection, according to a new preprint paper on the topic.…
The post-quantum cryptography apocalypse will be televised in 10 years, says UK's NCSC
The UK's National Cyber Security Centre (NCSC) today started the post-quantum cryptography (PQC) countdown clock by claiming organizations have ten years to migrate to a safer future.…
Attackers swipe data of 500k+ people from Pennsylvania teachers union
The Pennsylvania State Education Association (PSEA) says a July 2024 "security incident" exposed sensitive personal data on more than half a million individuals, including financial and health info.…
Names, bank info, and more spills from top sperm bank
One of the world's largest sperm banks, California Cryobank, is in a sticky situation.…
IBM scores perfect 10 ... vulnerability in mission-critical OS AIX
IBM "strongly recommends" customers running its Advanced Interactive eXecutive (AIX) operating system apply patches after disclosing two critical vulnerabilities, one of which has a perfect 10 severity score.…
Ex-US Cyber Command chief: Europe and 5 Eyes can't fully replicate US intel
If the United States stopped sharing cyber-threat intel with Ukraine, its European allies and the rest of the Five Eyes nations wouldn't be able to provide all the info Uncle Sam collects, according to former chief of US Cyber Command and the NSA General Paul Nakasone.…
Show top LLMs buggy code and they'll finish off the mistakes rather than fix them
Researchers have found that large language models (LLMs) tend to parrot buggy code when tasked with completing flawed snippets.…
CISA fires, now rehires and immediately benches security crew on full pay
The upheaval at the US government's Cybersecurity and Infrastructure Security Agency, aka CISA, took another twist on Tuesday, as it moved to reinstate staffers it had fired over the past few weeks - specifically those still in their probationary period - though they've been benched on paid leave for now.…
US tech jobs outlook clouded by DOGE cuts, Trump tariffs
A pair of reports on tech sector employment trends in the United States suggest out-of-work techies right now have relatively decent prospects, but economic uncertainty and rapid policy changes initiated by the Trump administration mean the future job market looks less rosy.…
Microsoft isn't fixing 8-year-old shortcut exploit abused for spying
An exploitation avenue found by Trend Micro has been used in an eight-year-long spying campaign, but there's no sign of a fix from Microsoft, which apparently considers this a low priority.…
Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos
Wiz security researchers think they've found the root cause of the GitHub supply chain attack that unfolded over the weekend, and they say that a separate attack may have been to blame.…
UK wants dirt on data brokers before criminals get there first
The UK government is inviting experts to provide insights about the data brokerage industry and the potential risks it poses to national security as it moves to push new data-sharing legislation over the line.…
Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up
Dark web analysts at infosec software vendor Fortra have discovered an extortion crew named Ox Thief that threatened to contact Edward Snowden if a victim didn’t pay to protect its data – a warning that may be an indicator of tough times in the ransomware world for some, at least.…
'Dead simple' hijacking hole in Apache Tomcat 'now actively exploited in the wild'
A trivial flaw in Apache Tomcat that allows remote code execution and access to sensitive files is said to be under attack in the wild within a week of its disclosure.…
Court filing: DOGE aide broke Treasury policy by emailing unencrypted database
A now-former DOGE aide violated US Treasury policy by emailing an unencrypted database containing people's private information to two Trump administration officials, according to a court document filed Friday.…
Amazon boots local Alexa processing: All your voice requests shipped to the cloud
Come March 28, those who opted to have their voice commands for Amazon's AI assistant Alexa processed locally on their Echo devices will lose that option, with all spoken requests pushed to the cloud for analysis.…
GitHub supply chain attack spills secrets from 23,000 projects
It's not such a happy Monday for defenders wiping the sleep from their eyes only to deal with the latest supply chain attack.…
UK government to open £16B IT services competition after 6-month delay
UK government is set to crack open the pork barrel for up to £16 billion in contracts for a range of IT services. The buying framework was delayed by six months and the total pot of spending is now potentially 25 percent bigger than the previous proposal.…