Security News

Facebook and Instagram outage logs out users, passwords not working
2024-03-05 16:18

Facebook and Instagram users worldwide have been logged out of the sites and are having trouble logging in, receiving errors that their passwords are incorrect. The outage has caused people to automatically get logged out of Meta and for Instagram to no longer work, giving errors like "Couldn't refresh feed."

IP address X-posure now a feature on Musk's social media thing
2024-03-05 16:18

Video and audio calling features for X Premium users added last year to Elon Musk's version of Twitter have been expanded to everyone on the platform, and we're warning Reg readers yet again to disable the feature - this time because it appears to expose user IP addresses. X even admits that its audio and video calling exposes user IPs on the help page for the feature.

Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware
2024-03-05 16:18

North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called TODDLERSHARK. According to a report shared by Kroll with...

Comparison Chart: VPN Service Providers (Free Download)
2024-03-05 16:00

The VPN service provider market is nothing if not crowded, which makes picking a provider a difficult process. Whether you intend to use your VPN for added security when using free Wi-Fi networks, trying to shield your internet use from your ISP or aiming to circumvent geographical restrictions when traveling, how you want to use a VPN should influence what service provider you choose.

Perimeter Security Policy
2024-03-05 16:00

While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get through is an especially critical goal. Whether traffic is going from outside to inside or vice versa, having a strong, comprehensive and reliable perimeter security policy is integral to securing organizational data and the employees who use it to do their jobs and conduct company business.

BlackCat ransomware shuts down in exit scam, blames the "feds"
2024-03-05 15:49

The BlackCat ransomware gang is pulling an exit scam, trying to shut down and run off with affiliates' money by pretending the FBI seized their site and infrastructure. "The ransomware gang started the exit-scam operation on Friday, when they took their Tor data leak blog offline. On Monday, they further shut down the negotiation servers, saying that they decided to turn everything off, amid complaints from an affiliate that the operators stole a $20 million Change Healthcare ransom from them."

Passwords are Costing Your Organization Money - How to Minimize Those Costs
2024-03-05 15:02

From the countless hours your service desk spends resetting passwords and unlocking accounts, to the massive cost of security incidents or data breaches, passwords cost you money. We'll explore the hidden costs of managing passwords and discuss the steps you can take to maximize their security while mitigating costs.

Rapid7 throws JetBrains under the bus for 'uncoordinated vulnerability disclosure'
2024-03-05 13:15

Security shop Rapid7 is criticizing JetBrains for flouting its policy against silent patching regarding fixes for two fresh vulnerabilities in the TeamCity CI/CD server. According to the cybersecurity company, it replied by saying it wouldn't agree to swift disclosure, and pointed JetBrains to its policy against silently patching vulnerabilities, which stipulates that if companies violate that policy, Rapid7 will itself release the full details of the vulnerability, including enough information to allow people to develop exploits, within 24 hours.

The Insecurity of Video Doorbells
2024-03-05 12:05

"Sometimes when you pay for what you get, you really pay for what you get over and over." Meaning that "Buyer beware" is rather more than a surface effect.

What is Exposure Management and How Does it Differ from ASM?
2024-03-05 10:55

Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the agility and flexibility that cloud environments provide,...