Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Microsoft exec admits it ‘cannot guarantee’ data sovereignty • The Register

Microsoft exec admits it ‘cannot guarantee’ data sovereignty • The Register

by Syndicated News Feed | Jul 25, 2025 | IT Security | 0 Comments

Microsoft says it "cannot guarantee" data sovereignty to customers in France – and by implication the wider European Union – should the Trump administration demand access to customer information held on its servers. The Cloud Act is a law that gives the US...

read more
US sanctions North Korean firm, nationals behind IT worker schemes

US sanctions North Korean firm, nationals behind IT worker schemes

by Syndicated News Feed | Jul 25, 2025 | IT Security | 0 Comments

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned three North Korean nationals and a company for supporting fraudulent IT worker schemes that generated illicit revenue for the Democratic People’s Republic of Korea...

read more
IR35 advisor Qdos confirms a data leak to techie clients • The Register

IR35 advisor Qdos confirms a data leak to techie clients • The Register

by Syndicated News Feed | Jul 25, 2025 | IT Security | 0 Comments

Business insurance and employment status specialist Qdos has confirmed that an intruder has stolen some customers personal data, according to a communication to tech contractors that was seen by The Register. Qdos yesterday emailed clients on its database to...

read more
Laptop farmer behind M IT worker scam locked up • The Register

Laptop farmer behind $17M IT worker scam locked up • The Register

by Syndicated News Feed | Jul 24, 2025 | IT Security | 0 Comments

An Arizona woman who ran a laptop farm from her home - helping North Korean IT operatives pose as US-based remote workers - has been sentenced to eight and a half years behind bars for her role in a $17 million fraud that hit more than 300 American companies....

read more
BlackSuit ransomware extortion sites seized in Operation Checkmate

BlackSuit ransomware extortion sites seized in Operation Checkmate

by Syndicated News Feed | Jul 24, 2025 | IT Security | 0 Comments

Law enforcement has seized the dark web extortion sites of the BlackSuit ransomware operation, which has targeted and breached the networks of hundreds of organizations worldwide over the past several years. The U.S. Department of Justice confirmed the takedown...

read more
Hacker sneaks infostealer malware into early access Steam game

Hacker sneaks infostealer malware into early access Steam game

by Syndicated News Feed | Jul 24, 2025 | IT Security | 0 Comments

A threat actor called EncryptHub has compromised a game on Steam to distribute info-stealing malware to unsuspecting users downloading the title. A few days ago, the hacker (also tracked as Larva-208), injected malicious binaries into the Chemia game files...

read more
The EFF turns 35, but there’s plenty more to do • The Register

The EFF turns 35, but there’s plenty more to do • The Register

by Syndicated News Feed | Jul 24, 2025 | IT Security | 0 Comments

Interview In July 1990, before the World Wide Web even existed, an unusual alliance was formed to fight for the rights of the emerging online community. Lotus founder Mitch Kapor, John Perry Barlow – who wrote some of the Grateful Dead's most epic lyrics – and...

read more
SharePoint servers also targeted in ransomware attacks

SharePoint servers also targeted in ransomware attacks

by Syndicated News Feed | Jul 24, 2025 | IT Security | 0 Comments

A China-based hacking group is deploying Warlock ransomware on Microsoft SharePoint servers vulnerable to widespread attacks targeting the recently patched ToolShell zero-day exploit chain. "Although Microsoft has observed this threat actor deploying Warlock...

read more
An all-you-can-eat buffet for threat actors

An all-you-can-eat buffet for threat actors

by Syndicated News Feed | Jul 24, 2025 | IT Security | 0 Comments

ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities 24 Jul 2025  •  , 5 min. read On July 19th, 2025, Microsoft confirmed that a set of zero-day vulnerabilities in SharePoint Server called ToolShell is...

read more
Look out for phony verification pages spreading malware

Look out for phony verification pages spreading malware

by Syndicated News Feed | Jul 24, 2025 | IT Security | 0 Comments

Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware 24 Jul 2025  •  , 4 min. read Bots have got a lot to answer for. They now make up over half of all internet...

read more
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (7,382)

Recent Posts

  • McDonald’s not lovin’ it when hacker exposes rotten security • The Register 08/20/2025
  • Ollama bug allows drive-by attacks 08/19/2025
  • PyPI now blocks domain resurrection attacks used for hijacking accounts 08/19/2025
  • Pharma firm Inotiv says ransomware attack impacted operations 08/19/2025
  • US spy chief claims UK backdown on Apple backdoor demand • The Register 08/19/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.