The Register

Biting the hand that feeds IT — Enterprise Technology News and Analysis
  1. Says it was probably hacked, which isn't good news either

    A trio of Polish security researchers claim to have found that trains built by Newag SA contain software that sabotages them if the hardware is serviced by competitors.…

  2. The Russians are coming! Err, they've already infiltrated UK, US inboxes

    Russia-backed attackers have named new targets for their ongoing phishing campaigns, with defense-industrial firms and energy facilities now in their sights, according to agencies of the Five Eyes alliance.…

  3. Akamai says it reported the flaws to Microsoft. Redmond shrugged

    A series of attacks against Microsoft Active Directory domains could allow miscreants to spoof DNS records, compromise Active Directory and steal all the secrets it stores, according to Akamai security researchers.…

  4. As Cyber Solidarity Act edges closer to full adoption in Europe

    The US Cybersecurity and Infrastructure Security Agency (CISA) has signed a working arrangement with its EU counterparts to increase cross-border information sharing and more to tackle criminals.…

  5. Indictments allege plot to shift FPGAs, accelerometers, and spycams

    A Belgian man has been arrested and charged for his role in a years-long smuggling scheme to export military-grade electronics from the US to Russia and China.…

  6. Plans to share 'vast amounts of data' – very carefully

    Australia is building a top-secret cloud to host intelligence data and share it with the US and UK, which have their own clouds built for the same purpose.…

  7. Issue has been around since at least 2012

    A years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm SkySafe.…

  8. Apparently no one thought to check if this D-Link router 'issue' was actually exploitable

    A security vulnerability previously added to CISA's Known Exploited Vulnerability catalog (KEV), which was recognized by CVE Numbering Authorities (CNA), and included in reputable threat reports is now being formally rejected by infosec organizations.…

  9. Why we need the confidence to deploy secure, compliant AI-powered applications and workloads

    Sponsored Feature  Every organisation must prioritise the protection of mission critical data, applications and workloads or risk disaster in the face of an ever-widening threat landscape.…

  10. Bitbucket, Confluence and Jira all in danger, again. Sigh

    Atlassian has emailed its customers to warn of four critical vulnerabilities, but the message had flaws of its own – the links it contained weren't live for all readers at the time of despatch.…

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form