Israel plans ‘Cyber-Dome’ to defend digital attacks • The Register
The new head of Israel's National Cyber Directorate (INCD) has announced the nation intends to build a "Cyber-Dome" – a national defense system to fend off digital attacks. Gaby Portnoy, director general of INCD, revealed plans for Cyber-Dome on Tuesday,...
Adopt Modern Auth now for Exchange Online • The Register
The US government is pushing federal agencies and private corporations to adopt the Modern Authentication method in Exchange Online before Microsoft starts shutting down Basic Authentication from the first day of October. In an advisory [PDF] this week, Uncle...
Do back offices mean backdoors?
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture European business leadership, especially CISOs, CTOs, and chief data officers (CDOs), are adjusting to the fact that the war in Ukraine is a war in...
Microsoft postpones shift to cloudy subscriptions • The Register
Microsoft has indefinitely postponed the date on which its Cloud Solution Providers (CSPs) will be required to sell software and services licences on new terms. Those new terms are delivered under the banner of the New Commerce Experience (NCE). NCE is intended...
Trio accused of selling $88m of pirated Avaya licenses • The Register
Three people accused of selling pirate software licenses worth more than $88 million have been charged with fraud. The software in question is built and sold by US-based Avaya, which provides, among other things, a telephone system called IP Office to small and...
Walmart sued by FTC over large-scale money transfer fraud • The Register
America's Federal Trade Commission has sued Walmart, claiming it turned a blind eye to fraudsters using its money transfer services to con folks out of "hundreds of millions of dollars." In a lawsuit [PDF] filed Tuesday, the regulator claimed the superstore...
Customized malware coded to target OT systems • The Register
Sponsored Feature Malware targeting operational technology (OT) and industrial controls systems (ICS) doesn't come along very often. But when it does, it's worth paying close attention. Notable incidents include Industroyer, a malware suite used in 2015 and...
RansomHouse gang claims to have some stolen AMD data • The Register
If claims hold true, AMD has been targeted by the extortion group RansomHouse, which says it is sitting on a trove of data stolen from the processor designer following an alleged security breach earlier this year. RansomHouse says it obtained the files from an...
Model attack paths into your organization before hackers do • The Register
Webinar What does your tech infrastructure look like to the outside world? You might think it looks like an impenetrable fortress or a black box. You're probably wrong. A determined and sophisticated cyber attacker's first step will be to model their likely...
Tencent admits to poisoned QR code attack on QQ accounts • The Register
Chinese web giant Tencent has admitted to a significant account hijack attack on its QQ.com messaging and social media platform. In a post to rival social media platform Sina Weibo – a rough analog of Twitter – Tencent apologized for the incident. The problem...