Category: The Register – Security

Taming the multi-vault beast

GitGuardian takes on enterprise secrets sprawl Partner Content  With Non-Human Identities (NHIs) now outnumbering human users 100 to one in enterprise environments, managing secrets across multiple vaults has become a significant security concern.… This article has been indexed from The…

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes We now know the remote code execution vulnerability in Apache Struts 2 disclosed back in November carries a near-maximum severity rating following the publication of the CVE.… This article has…

British Army zaps drones out of the sky with laser trucks

High-energy weapon proves its mettle in testing The British Army has successfully destroyed flying drones for the first time using a high-energy laser mounted on an armored vehicle. If perfected, the technology could form an effective counter-measure against drone attacks.… This article…

AMD secure VM tech undone by DRAM meddling

Boffins devise BadRAM attack to pilfer secrets from SEV-SNP encrypted memory Researchers have found that the security mechanism AMD uses to protect virtual machine memory can be bypassed with $10 of hardware – and perhaps not even that.… This article…

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren’t; Polish spy boss arrested, and more Infosec in brief  Still smarting over that grocery disruption caused by a ransomware attack on supply chain SaaS vendor Blue…

Protect your clouds

Get best practice advice on how to safeguard your cloud infrastructure from SANS Sponsored Post  According to the 2024 IBM Cost of the Data Breach Report 40 percent of data breaches identified between March 2023 and February 2024 involved data…

Explore strategies for effective endpoint control

Discover how automation can simplify endpoint management in this webinar Webinar  Managing endpoints in today’s dynamic IT environments is becoming increasingly complex.… This article has been indexed from The Register – Security Read the original article: Explore strategies for effective…

Shape the future of UK cyber security

Support the industry by sponsoring the UK Cyber Team Competition Partner Content  The opportunity to identify, foster and nurture talented young people towards a cyber security career should always be grabbed with both hands.… This article has been indexed from…

Cops arrest suspected admin of German-language crime bazaar

Drugs, botnets, forged docs, and more generated fortune for platform sellers German authorities say they have again shut down the perhaps unwisely named Crimenetwork platform and arrested a suspected admin.… This article has been indexed from The Register – Security…

Chinese ship casts shadow over Baltic subsea cable snipfest

Danish military confirms it is monitoring as Swedish police investigate. Cloudflare says impact was ‘minimal’ The Danish military has confirmed it is tracking a Chinese ship that is under investigation after two optical fiber internet cables under the Baltic Sea…

Simplifying endpoint security

Discover unified strategies to secure and manage all endpoints across your organization Webinar  As organizations expand their digital footprint, the range of endpoints – spanning from laptops to IoT devices – continues to grow.… This article has been indexed from…

Microsoft Power Pages misconfigurations exposing sensitive data

NHS supplier that leaked employee info fell victim to fiddly access controls that can leave databases dangling online Private businesses and public-sector organizations are unwittingly exposing millions of people’s sensitive information to the public internet because they misconfigure Microsoft’s Power…

Managing third-party risks in complex IT environments

Key steps to protect your organization’s data from unauthorized external access Webinar  With increasing reliance on contractors, partners, and vendors, managing third-party access to systems and data is a complex security challenge.… This article has been indexed from The Register…

Winos4.0 abuses gaming apps to infect, control Windows machines

‘Multiple’ malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.… This article has been indexed from The Register…