The Register

US effectively bans imports of Chinese telecoms products

The US Federal Communications Commission (FCC) has barred itself from authorizing the import or sale of Chinese telecoms and video surveillance products from Huawei, ZTE, Hytera Communications, Hikvision, and Dahua, on national security grounds.

World Cup phishing emails spike in Middle Eastern countries

Phishing attempts targeting victims in the Middle East increased 100 percent last month in the lead-up to the FIFA World Cup 2022 in Qatar, according to security shop Trellix.

US offshore oil and gas at 'increasing' risk of cyberattack

The US Government Accountability Office (GAO) has warned that the time to act on securing the US's offshore oil and natural gas installations is now because they are under "increasing" and "significant risk" of cyberattack.
November 19, 2022

Hive ransomware crooks extort $100m from 1,300 global orgs

In a joint advisory with CISA and HHS, the FBI this week detailed Hive indicators of compromise and commonly used techniques and procedures that the Feds have observed as recently as this month.

EV charging infrastructure is seriously insecure

A group of researchers has found that the growing network of EV charging systems is poorly secured and could one day be used to destabilize entire electrical grids. And it contains enough security issues to be problematic even today.

WASP Malware Uses Steganography and Polymorphism to Evade Detection

PyPI, an open-source repository used by developers to share Python packages used in projects, is an increasingly popular target in software supply chain attacks for uploading malicious code via fake packages.

Australia to 'stand up and punch back' against cybercriminals

Australia's government has declared the nation is planning to go on the offensive against international cyber crooks following recent high-profile attacks on local health insurer Medibank and telco Optus.

EU calls for joint cyber defense in response to Russia

The European Commission on Thursday proposed a cyber defense policy in response to Europe's "deteriorating security environment" since Russia illegally invaded Ukraine earlier this year.

Can confidential computing stop the next big crypto heist?

Confidential computing aims to isolate sensitive data without exposing it to the rest of the system, where it would be more vulnerable to intruders. It does this by processing encrypted data in memory using hardware-based secure enclaves.

Microsoft switches on password-free mobile authentication

The authentication method is based on certificates rather than passwords. Microsoft, along with others including Apple and Google, is pushing for passwordless authentication – and aims to fend off phishing attacks designed to get around MFA.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags