AdminLTELogo
Moscow
Beijing
Riyadh
London
D.C.

Ransomware Feed

Daily Headlines

National Herald None More
Argus News None More
Sky News None Russia-Ukraine War More
Business Wire 16 hours ago More
Verizon 21 hours ago Vulnerability More
PR Newswire a day ago More
NetNewsLedger a day ago Ransomware More
Business News Wales a day ago More
Head Topics a day ago Vulnerability More
Head Topics a day ago Vulnerability More
Vlada Crne Gore - GOV.ME a day ago More
The Hacker News a day ago More
Nagpur Today a day ago Vulnerability More
WGNO a day ago Vulnerability More
The Hacker News a day ago More
News Today a day ago ICS More

CVE Update

CVE-2024-25938 8.8 2024-04-30T15:15Z
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Barcode widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2024-25648 8.8 2024-04-30T15:15Z
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2024-25575 8.8 2024-04-30T15:15Z
A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2024-4185 8.1 2024-04-30T09:15Z
The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the "Login the user automatically after the account is verified" and "Verify account for current users" options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.
CVE-2024-2663 8.3 2024-04-30T09:15Z
The ZD YouTube FLV Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.6 via the $_GET['image'] parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
CVE-2024-3375 9.4 2024-04-29T09:15Z
Incorrect Permission Assignment for Critical Resource vulnerability in Havelsan Inc. Dialogue allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dialogue: from v1.83 before v1.83.1 or v1.84.
CVE-2024-4303 8.8 2024-04-29T06:15Z
ArmorX Android APP's multi-factor authentication (MFA) for the login function is not properly implemented. Remote attackers who obtain user credentials can bypass MFA, allowing them to successfully log into the APP.
CVE-2024-4301 8.8 2024-04-29T04:15Z
N-Reporter and N-Cloud, products of the N-Partner, have an OS Command Injection vulnerability. Remote attackers with normal user privilege can execute arbitrary system commands by manipulating user inputs on a specific page.
CVE-2024-4300 9.8 2024-04-29T04:15Z
E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remote attacker can obtain the database configuration file path through the webpage source code without login. Accessing this path allows attacker to obtain the database credential with the highest privilege and database host IP address. With this information, attackers can connect to the database and perform actions such as adding, modifying, or deleting database contents.
CVE-2022-48662 7.8 2024-04-28T13:15Z
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017 [ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915] [ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 <49> 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff [ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202 [ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000 [ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68 [ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc [ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860 [ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc [ 4070.575016] FS: 00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000 [ 4070.575021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0 [ 4070.575029] Call Trace: [ 4070.575033] <TASK> [ 4070.575037] lrc_configure_all_contexts+0x13e/0x150 [i915] [ 4070.575103] gen8_enable_metric_set+0x4d/0x90 [i915] [ 4070.575164] i915_perf_open_ioctl+0xbc0/0x1500 [i915] [ 4070.575224] ? asm_common_interrupt+0x1e/0x40 [ 4070.575232] ? i915_oa_init_reg_state+0x110/0x110 [i915] [ 4070.575290] drm_ioctl_kernel+0x85/0x110 [ 4070.575296] ? update_load_avg+0x5f/0x5e0 [ 4070.575302] drm_ioctl+0x1d3/0x370 [ 4070.575307] ? i915_oa_init_reg_state+0x110/0x110 [i915] [ 4070.575382] ? gen8_gt_irq_handler+0x46/0x130 [i915] [ 4070.575445] __x64_sys_ioctl+0x3c4/0x8d0 [ 4070.575451] ? __do_softirq+0xaa/0x1d2 [ 4070.575456] do_syscall_64+0x35/0x80 [ 4070.575461] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 4070.575467] RIP: 0033:0x7f1ed5c10397 [ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48 [ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397 [ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006 [ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005 [ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a [ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0 [ 4070.575505] </TASK> [ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus ---truncated---
CVE-2022-48658 7.8 2024-04-28T13:15Z
In the Linux kernel, the following vulnerability has been resolved: mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context. Commit 5a836bf6b09f ("mm: slub: move flush_cpu_slab() invocations __free_slab() invocations out of IRQ context") moved all flush_cpu_slab() invocations to the global workqueue to avoid a problem related with deactivate_slab()/__free_slab() being called from an IRQ context on PREEMPT_RT kernels. When the flush_all_cpu_locked() function is called from a task context it may happen that a workqueue with WQ_MEM_RECLAIM bit set ends up flushing the global workqueue, this will cause a dependency issue. workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core] is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637 check_flush_dependency+0x10a/0x120 Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core] RIP: 0010:check_flush_dependency+0x10a/0x120[ 453.262125] Call Trace: __flush_work.isra.0+0xbf/0x220 ? __queue_work+0x1dc/0x420 flush_all_cpus_locked+0xfb/0x120 __kmem_cache_shutdown+0x2b/0x320 kmem_cache_destroy+0x49/0x100 bioset_exit+0x143/0x190 blk_release_queue+0xb9/0x100 kobject_cleanup+0x37/0x130 nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc] nvme_free_ctrl+0x1ac/0x2b0 [nvme_core] Fix this bug by creating a workqueue for the flush operation with the WQ_MEM_RECLAIM bit set.
CVE-2022-48655 7.8 2024-04-28T13:15Z
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-of-bound violations if the SCMI driver misbehave. Add an internal consistency check before any such domains descriptors accesses.
CVE-2024-3342 9.9 2024-04-27T09:15Z
The Timetable and Event Schedule by MotoPress plugin for WordPress is vulnerable to SQL Injection via the 'events' attribute of the 'mp-timetable' shortcode in all versions up to, and including, 2.4.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVE-2024-22391 7.7 2024-04-25T15:16Z
A heap-based buffer overflow vulnerability exists in the LookupTable::SetLUT functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2024-22373 8.1 2024-04-25T15:16Z
An out-of-bounds write vulnerability exists in the JPEG2000Codec::DecodeByStreamsCommon functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2024-20353 8.6 2024-04-24T19:15Z
A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
CVE-2024-4071 8.8 2024-04-23T22:15Z
A vulnerability was found in Kashipara Online Furniture Shopping Ecommerce Website 1.0 and classified as critical. This issue affects some unknown processing of the file prodInfo.php. The manipulation of the argument prodId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261797 was assigned to this vulnerability.

Statistics

TOP News Source
The Hacker News 541
Help Net Security 339
PR Newswire 337
SC Magazine 319
CISA 311
TOP Tags
Vulnerability 12682
Ransomware 1696
Russia-Ukraine War 992
ICS 742

Team Tasks

    AdminLTELogo Tue, 30 Apr 24 12:00:00 +0000 CISA Releases Three Industrial Control Systems Advisories AdminLTELogo Tue, 30 Apr 24 12:00:00 +0000 CISA Adds One Known Exploited Vulnerability to Catalog AdminLTELogo Thu, 25 Apr 24 12:00:00 +0000 CISA Releases Eight Industrial Control Systems Advisories AdminLTELogo Wed, 24 Apr 24 12:00:00 +0000 CISA Adds Three Known Exploited Vulnerabilities to Catalog AdminLTELogo Wed, 24 Apr 24 12:00:00 +0000 Cisco Releases Security Updates Addressing ArcaneDoor, Vulnerabilities in Cisco Firewall Platforms AdminLTELogo Tue, 23 Apr 24 12:00:00 +0000 CISA Adds One Known Exploited Vulnerability to Catalog AdminLTELogo Tue, 23 Apr 24 12:00:00 +0000 CISA Releases Two Industrial Control Systems Advisories AdminLTELogo Fri, 19 Apr 24 12:00:00 +0000 Cisco Releases Security Advisories for Cisco Integrated Management Controller AdminLTELogo Thu, 18 Apr 24 12:00:00 +0000 Oracle Releases Critical Patch Update Advisory for April 2024 AdminLTELogo Thu, 18 Apr 24 12:00:00 +0000 CISA and Partners Release Advisory on Akira Ransomware AdminLTELogo TheHackerNews Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia AdminLTELogo TheHackerNews Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years AdminLTELogo TheHackerNews U.S. Government Releases New AI Security Guidelines for Critical Infrastructure AdminLTELogo TheHackerNews Considerations for Operational Technology Cybersecurity AdminLTELogo TheHackerNews New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024 AdminLTELogo TheHackerNews Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023 AdminLTELogo TheHackerNews China-Linked 'Muddling Meerkat' Hijacks DNS to Map Internet on Global Scale AdminLTELogo TheHackerNews Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM AdminLTELogo TheHackerNews New R Programming Vulnerability Exposes Projects to Supply Chain Attacks AdminLTELogo TheHackerNews Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover AdminLTELogo TheHackerNews Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks AdminLTELogo TheHackerNews Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw AdminLTELogo TheHackerNews Bogus npm Packages Used to Trick Software Developers into Installing Malware AdminLTELogo TheHackerNews Severe Flaws Disclosed in Brocade SANnav SAN Management Software AdminLTELogo TheHackerNews 10 Critical Endpoint Security Tips You Should Know AdminLTELogo TheHackerNews New 'Brokewell' Android Malware Spread Through Fake Browser Updates AdminLTELogo TheHackerNews Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack AdminLTELogo TheHackerNews Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites AdminLTELogo TheHackerNews North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures AdminLTELogo TheHackerNews Network Threats: A Step-by-Step Attack Demonstration AdminLTELogo TheHackerNews DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions AdminLTELogo TheHackerNews Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny AdminLTELogo TheHackerNews State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage AdminLTELogo TheHackerNews U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks AdminLTELogo TheHackerNews Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike AdminLTELogo TheHackerNews Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users AdminLTELogo TheHackerNews CISO Perspectives on Complying with Cybersecurity Regulations AdminLTELogo TheHackerNews eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners AdminLTELogo TheHackerNews CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers AdminLTELogo TheHackerNews Apache Cordova App Harness Targeted in Dependency Confusion Attack AdminLTELogo TheHackerNews Webinar: Learn Proactive Supply Chain Threat Hunting Techniques AdminLTELogo TheHackerNews Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases AdminLTELogo TheHackerNews Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery AdminLTELogo TheHackerNews German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies AdminLTELogo TheHackerNews U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse AdminLTELogo TheHackerNews Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware AdminLTELogo TheHackerNews ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft AdminLTELogo TheHackerNews Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation AdminLTELogo TheHackerNews MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws AdminLTELogo TheHackerNews Ransomware Double-Dip: Re-Victimization in Cyber Extortion AdminLTELogo TheHackerNews Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers AdminLTELogo TheHackerNews Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage AdminLTELogo TheHackerNews New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth AdminLTELogo TheHackerNews Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack AdminLTELogo TheHackerNews Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks AdminLTELogo TheHackerNews BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool AdminLTELogo TheHackerNews How Attackers Can Own a Business Without Touching the Endpoint AdminLTELogo TheHackerNews Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers AdminLTELogo TheHackerNews Hackers Target Middle East Governments with Evasive "CR4T" Backdoor AdminLTELogo TheHackerNews OfflRouter Malware Evades Detection in Ukraine for Almost a Decade AdminLTELogo theregister Cyber-bastard jailed for stealing psychotherapy files, blackmailing patients AdminLTELogo theregister UnitedHealth CEO: 'Decision to pay ransom was mine' AdminLTELogo theregister NSA guy who tried and failed to spy for Russia gets 262 months in the slammer AdminLTELogo theregister London Drugs closes all of its pharmacies following 'cybersecurity incident' AdminLTELogo theregister Cops cuff man for allegedly framing colleague with AI-generated hate speech clip AdminLTELogo theregister Two cuffed in Samourai Wallet crypto dirty money sting AdminLTELogo theregister Russia, Iran pose most aggressive threat to 2024 elections, say infoseccers AdminLTELogo theregister Australia’s spies and cops want ‘accountable encryption’ - aka access to backdoors AdminLTELogo theregister US charges Iranians with cyber snooping on government, companies AdminLTELogo theregister UnitedHealth admits IT security breach could 'cover substantial proportion of people in America' AdminLTELogo theregister Leicester streetlights take ransomware attack personally, shine on 24/7 AdminLTELogo theregister Misconfigured cloud server leaked clues of North Korean animation scam AdminLTELogo theregister Sacramento airport goes no-fly after AT&amp;T internet cable snipped AdminLTELogo theregister Cybercriminals threaten to leak all 5 million records from stolen database of high-risk individuals AdminLTELogo theregister Ransomware feared as IT 'issues' force Octapharma Plasma to close 150+ centers AdminLTELogo theregister Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims AdminLTELogo theregister Fraudsters abused Apple Stores' third-party pickup policy to phish for profits AdminLTELogo theregister 185K people's sensitive data in the pits after ransomware raid on Cherry Health AdminLTELogo theregister Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op AdminLTELogo theregister Singapore infosec boss warns China/West tech split will be bad for interoperability AdminLTELogo theregister MGM says FTC can't possibly probe its ransomware downfall – watchdog chief Lina Khan was a guest at the time AdminLTELogo theregister SIM swap crooks solicit T-Mobile US, Verizon staff via text to do their dirty work AdminLTELogo theregister Change Healthcare’s ransomware attack costs edge toward $1B so far AdminLTELogo theregister Roku makes 2FA mandatory for all after nearly 600K accounts pwned AdminLTELogo theregister Zero-day exploited right now in Palo Alto Networks' GlobalProtect gateways AdminLTELogo theregister Microsoft breach allowed Russian spies to steal emails from US government AdminLTELogo theregister UK businesses shockingly unaware of how to handle security threats AdminLTELogo theregister Home Depot confirms worker data leak after miscreant dumps info online AdminLTELogo theregister Puppies, kittens, data at risk after 'cyber incident' at veterinary giant AdminLTELogo theregister Change Healthcare faces second ransomware dilemma weeks after ALPHV attack AdminLTELogo theregister US government excoriates Microsoft for 'avoidable errors' but keeps paying for its products AdminLTELogo theregister Ransomware gang <em>did</em> steal residents' confidential data, UK city council admits AdminLTELogo theregister Nearly 1M medical records feared stolen from City of Hope cancer centers AdminLTELogo theregister Pandabuy confirms crooks nabbed data on 1.3M punters AdminLTELogo theregister INC Ransom claims to be behind 'cyber incident' at UK city council AdminLTELogo theregister Six banks share customer info to help Singapore fight money laundering AdminLTELogo theregister AT&amp;T admits massive 70M+ mid-March customer data dump is real though old AdminLTELogo theregister Malicious SSH backdoor sneaks into xz, Linux world's data compression library AdminLTELogo theregister FTX crypto-crook Sam Bankman-Fried gets 25 years in prison AdminLTELogo theregister INC Ransom claims responsibility for attack on NHS Scotland AdminLTELogo theregister Execs in Japan busted for winning dev bids then outsourcing to North Koreans AdminLTELogo theregister China encouraged armed offensive against Myanmar government to protest proliferation of online scams AdminLTELogo theregister Miscreants are exploiting enterprise tech zero days more and more, Google warns AdminLTELogo theregister Street newspaper appears to have Big Issue with Qilin ransomware gang AdminLTELogo theregister Ransomware can mean life or death at hospitals. DEF CON hackers to the rescue? AdminLTELogo theregister UK elections are unaffected by China's cyber-interference, says deputy PM AdminLTELogo theregister US charges Chinese nationals with cyber-spying on pretty much everyone for Beijing AdminLTELogo theregister Over 170K users caught up in poisoned Python package ruse AdminLTELogo theregister Tech trade union confirms cyberattack behind IT, email outage AdminLTELogo theregister Time to examine the anatomy of the British Library ransomware nightmare