Wednesday, November 30, 2022
The Register

Criminals use trending TikTok challenge to make data-stealing malware invisible

PSA: Don't download unknown apps even if they promise naked people Malware-slinging miscreants are taking advantage of a trending TikTok challenge — and viewers' dirty minds — to spread data-stealing malware via a phony app that's had more than...
The Register

Lockheed Martin’s Army cyber training platform goes civilian

Army civilian employees, that is, but aerospace biz says it could be used in the private sector, too Locheed Martin has bagged a government contract to train 17,000 remote US Army civilian employees on security readiness, and wants to...
The Register

The five cyber attack techniques of the apocalypse

Watch SANS experts discuss some of the most devious and dangerous methods employed by hackers in 2022 Webinar  This year's RSA Conference saw SANS security experts gather to identify and discuss five of the most dangerous cyber attack techniques...
The Register

Sandworm gang launches Monster ransomware attacks on Ukraine

The RansomBoggs campaign is the Russia-linked group’s latest assault on the smaller country The Russian criminal crew Sandworm is launching another attack against organizations in Ukraine, using a ransomware that analysts at Slovakian software company ESET are calling RansomBoggs.…
The Register

International cops arrest hundreds of fraudsters, money launderers and cocaine kingpins

$155,000-a-month lifestyle ends in cuffs for suspected crim Europol has arrested hundreds of fraudsters, money launderers and cocaine kingpins, and shut down thousands of websites selling pirated and counterfeit products in a series of raids over the past month.…
The Register

Blockchain couldn’t stop TXT spam in India, regulator now trying AI

Maybe – just maybe – messages and calls from +91 might become more trustworthy India's Telecom Regulatory Authority (TRAI) has announced a fresh crackdown on TXT spam – this time using artificial intelligence, after a previous blockchain-powered effort delivered...
The Register

Windows Server domain controllers may stop, restart after recent updates

Microsoft outlines a workaround while pulling together a fix to LSASS memory leak Updates to Windows Server released as part of this month's Patch Tuesday onslaught might cause some domain controllers to stop working or automatically restart, according to...
The Register

Want to boost your cyber security skills by playing games this Christmas?

Register for this free SANS Holiday Hack Challenge to find out how Sponsored Post  Christmas is a time for gift giving and spending time with your friends and family – but that doesn't have to be all. What if...
The Register

US bans Chinese telecoms imports – won’t even consider authorizing them

Part bureaucratic box ticking, part crackdown that makes even Wi-Fi routers and smartphones off limits The United States' Federal Communications Commission (FCC) has barred itself from authorizing the import or sale of Chinese telecoms and video surveillance products from...
The Register

How advances in email encryption bring all-out security success

Listen in to our webinar on 30th November to find out Webinar  Email provides us with an infinite number of possible exchanges. We send approximately 332 billion messages a day but having so much convenience and flexibility at our...
The Register

Guess the most common password. Hint: We just told you

Also, Another red team tool at risk of turning to the darkside, and Meta catches the US military behaving badly In brief  NordPass has released its list of the most common passwords of 2022, and frankly we're disappointed in...
The Register

Elon Musk to abused Twitter users: your tormentors are coming back

Promises restoration of suspended accounts, despite previous pledge to do no such thing Twitter CEO Elon Musk has decided to allow suspended accounts back onto the micro-blogging service.…
The Register

UK bans Chinese CCTV cameras on ‘sensitive’ government sites

Agencies told to rip 'em off core networks and replace 'em whenever and wherever possible The United Kingdom has decided Chinese video cameras have no place in government facilities.…
The Register

Meta links US military to fake social media influence campaigns

Didn't say they were good, though – covert ops apparently got 'little to no engagement' from targets In its latest quarterly threat report, Meta said it had detected and disrupted influence operations originating in the US, and it calls...
The Register

European Parliament Putin things back together after cyber attack

DDoS started not long after Russia was declared a state sponsor of terrorism The European Parliament has experienced a cyber attack that started not long after it declared Russia to be a state sponsor of terrorism.…
The Register

Still using a discontinued Boa web server? Microsoft warns of supply chain attacks

Flaws in the open-source tool exploited – and India's power grid was a target Microsoft is warning that systems using the long-discontinued Boa web server could be at risk of attacks after a series of intrusion attempts of power...
TechRepublic

Gartner: How to Respond to the 2022 Cyberthreat Landscape

A new Gartner® report, How to Respond to the 2022 Cyberthreat Landscape, focuses on the new threats organizations will face as they prepare for the future of work and accelerate digital transformations. Gartner’s advice will help security and risk...
TechRepublic

Gartner MQ WAAP 2022

Research shows that web applications and API attacks continued to explode in the first half of 2022. Does your organization have the best defense today? Akamai recommends deploying a holistic web application and API protection (WAAP) solution. The right...
TechRepublic

How Akamai Helps to Mitigate the OWASP API Security Top 10 Vulnerabilities

Experts warn that API attacks will soon become the most common type of web application attack. As a result, organizations and their security vendors need to align across people, processes, and technologies to institute the right protections. The Open...
TechRepublic

What is Account Takeover and How to Prevent It in 2022

An account takeover (ATO), in which criminals impersonate legitimate account owners to take control of an account, are on the rise in Asia and across the world. Fraudsters are swindling money and digital assets from consumers across industries, with...
TechRepublic

The OWASP Top 10 – How Akamai Helps

OWASP publishes a list of the 10 most common vulnerabilities in web applications. This white paper details how Akamai can help mitigate these threat vectors. The post The OWASP Top 10 – How Akamai Helps appeared first on TechRepublic.