{"id":26926,"date":"2019-04-23T06:52:05","date_gmt":"2019-04-23T06:52:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/"},"modified":"2019-04-23T06:52:05","modified_gmt":"2019-04-23T06:52:05","slug":"like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/","title":{"rendered":"Like that other bloke who rose from the grave, the El Reg security desk is back this week&#8230;"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/11\/22\/kideasteregg.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> Welcome back, Brits, from your Easter break \u2013 assuming you weren&#8217;t working or on-call over the four-day weekend.<\/p>\n<p>Since you&#8217;ve been away from your desks, RSS feeds, and browsers, it&#8217;s been a busy time in cyber-security, what with <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/18\/facebook_hoovered_up_15m_address_books_without_permission\/\">not one<\/a> but two Facebook privacy cockups, one <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/18\/facebook_instagram_passwords\/\">cunningly<\/a> timed to coincide with the release of the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/18\/mueller_report_redacted\/\">Meuller report<\/a>, plus the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/19\/marcus_hutchins_pleads_guilty\/\">guilty plea<\/a> of British malware researcher Marcus Hutchins. Here&#8217;s some of the lesser news landing in and around the Easter break.<\/p>\n<h3 class=\"crosshead\"><span>Wipro wipeout<\/span><\/h3>\n<p>Last week started badly for Indian outsourcing giant Wipro after investigative journo Brian Krebs <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/krebsonsecurity.com\/2019\/04\/experts-breach-at-it-outsourcing-giant-wipro\/\">revealed<\/a> that its corporate network had been successfully penetrated by hackers, who were leveraging the intrusion to, at least attempt to, compromise a dozen or more of its customers.<\/p>\n<p>It appeared that the attack had been carrying on for more than a month, according to Krebs, and it appeared to be state sponsored. The biz initially tried to duck the issue, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/16\/wipro_confirms_flushing_phishers_from_systems\/\">then confirmed it had been hacked<\/a>, and then tried to play down news reports as inaccurate while on a conference call with financial analysts \u2013 which prompted Krebs to crash the call to clear his name:<\/p>\n<blockquote class=\"twitter-tweet tw-align-center\" data-lang=\"en\" readability=\"4.271186440678\">\n<p lang=\"en\" dir=\"ltr\">The Wipro quarterly earnings call would have gone really well if that pesky <a href=\"https:\/\/twitter.com\/briankrebs?ref_src=twsrc%5Etfw\">@briankrebs<\/a> hadn&#8217;t shown up&#8230; <a href=\"https:\/\/t.co\/LWEgdio6pf\">pic.twitter.com\/LWEgdio6pf<\/a><\/p>\n<p>\u2014 Graham Cluley (@gcluley) <a href=\"https:\/\/twitter.com\/gcluley\/status\/1118203223528169474?ref_src=twsrc%5Etfw\">April 16, 2019<\/a><\/p><\/blockquote>\n<p>On Friday, Wipro <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/economictimes.indiatimes.com\/tech\/ites\/wipro-says-critical-business-operations-unaffected-by-cyber-attack\/articleshow\/68955801.cms\">claimed<\/a> that while several staff had been fallen for phishing emails, &#8220;the incident did not impact the company&#8217;s ongoing critical business operations,&#8221; which kinda vaguely suggests customers weren&#8217;t directly affected. This kerfuffle could pretty much serve as a textbook case of how not to handle a computer security breach.<\/p>\n<h3 class=\"crosshead\"><span>Malware floods TV station off-air<\/span><\/h3>\n<p>Viewers of the Weather Channel in the US were left without regular service on Thursday when miscreants caused a hurricane of trouble for the broadcaster&#8217;s servers: a malware infection knocked its live feed off air.<\/p>\n<blockquote class=\"twitter-tweet tw-align-center\" data-lang=\"en\" readability=\"2.5903614457831\">\n<p lang=\"und\" dir=\"ltr\"><a href=\"https:\/\/t.co\/ovSgrgHxXY\">pic.twitter.com\/ovSgrgHxXY<\/a><\/p>\n<p>\u2014 The Weather Channel (@weatherchannel) <a href=\"https:\/\/twitter.com\/weatherchannel\/status\/1118849699388248064?ref_src=twsrc%5Etfw\">April 18, 2019<\/a><\/p><\/blockquote>\n<p>The expected programming at 0600 ET (1000 UTC) was unable to be broadcast, and the channel just stuck repeats up instead. It took nearly two hours before the <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/weather-channel-ansomware\/\">ransomware was scrubbed away<\/a>, and normal services resumed. The FBI is investigating.<\/p>\n<h3 class=\"crosshead\"><span>Iranian cyber-espionage tools leaked&#8230; ish<\/span><\/h3>\n<p>Portions of what appears to be Iranian government surveillance malware have been uploaded to the public internet via <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/t.me\/lab_dookhtegan\">a Telegram chat group<\/a> for anyone to grab.<\/p>\n<p>The bundle includes PowerShell and web-shell scripts used in recent cyber-attacks by the Iranian state-backed <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/attack.mitre.org\/groups\/G0049\/\">APT34<\/a>, aka OilRig, hacking gang. It also included some names, addresses, photographs, and phone numbers of people linked to the cyber-crew and Iran&#8217;s Ministry of Intelligence, along with data on some of APT34&#8217;s victims and the IP addresses of servers used to hack them.<\/p>\n<p>An <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/misterch0c.blogspot.com\/2019\/04\/apt34-oilrig-leak.html\">early analysis<\/a> revealed the leakers have been public minded enough to leave out crucial snippets of code, preventing the tools from being deployed in any practical sense, and avoid another <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/05\/30\/shadow_brokers_subscription_service\/\">Shadow Brokers fiasco<\/a>. There are no zero-day exploits or anything interesting like that; instead it appears to be a shot across Tehran&#8217;s bow by dox&#8217;ing its intelligence agents.<\/p>\n<p>&#8220;We are exposing here the cyber tools the ruthless Iranian Ministry of Intelligence has been using against Iran\u2019s neighboring countries, including names of the cruel managers, and information about the activities and the goals of these cyber-attacks,&#8221; the leakers wrote on Telegram. &#8220;We hope that other Iranian citizens will act for exposing this regime\u2019s real ugly face.&#8221;<\/p>\n<div class=\"boxout\" readability=\"25.75\">\n<p><strong>In brief&#8230;<\/strong> The Carbanak malware source code has apparently <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/ItsReallyNick\/status\/1120417734683242497\">accidentally turned up<\/a> on Virus Total&#8230;<\/p>\n<p>The backend database for an app that lets people provide the passwords to Wi-Fi hotspots to world+dog was <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/techcrunch.com\/2019\/04\/22\/hotspot-password-leak\/\">found facing<\/a> the public internet, revealing all the shared passwords in one go. The data store has since been taken offline&#8230;<\/p>\n<p>Free smartphone apps aimed at helping people with depression or trying to quit smoking are spilling private details to Facebook, Google, and others, without mentioning this in their privacy policies, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/jamanetwork.com\/journals\/jamanetworkopen\/fullarticle\/2730782\">a study has shown<\/a>&#8230;<\/p>\n<p>A <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/about.riot.im\/\">Riot<\/a>-forked secure messaging app called Tchap for French government workers was, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/medium.com\/@fs0c131y\/tchap-the-super-not-secure-app-of-the-french-government-84b31517d144\">surprise<\/a>, found to be insecure, in that anyone with the right skills could sign up for an account and natter away on it. The bug has been fixed&#8230;<\/p>\n<\/div>\n<h3 class=\"crosshead\"><span>Prison for Codeshop dark souk admin<\/span><\/h3>\n<p>A Macedonian man is facing seven and a half years in the US prison system, plus some major fines, after being convicted of running a stolen credit card market online.<\/p>\n<p>Djevair Ametovski was sentenced to 90 months behind bars after pleading guilty to running Codeshop between 2010 and 2014 on the dark web, and told to cough up $250,000 and other damages. The forum had a large database of stolen credit cards for sale, stored in a form that allowed for searches by bank identification number, financial institution, country, state and card brand for different geographical locations.<\/p>\n<p>\u201cThe sentencing of this transnational cybercriminal emphasizes the commitment of the Secret Service to disrupt and dismantle global criminal networks,\u201d <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.justice.gov\/usao-edny\/pr\/operator-global-cybercrime-marketplace-sentenced-90-months-imprisonment\">said<\/a> US Secret Service Special Agent-in-Charge David Beach.<\/p>\n<p>\u201cThe Secret Service will continue to work closely with our network of law enforcement partners to dismantle criminal enterprises seeking to victimize innocent people, regardless of geographic distance or borders.\u201d<\/p>\n<h3 class=\"crosshead\"><span>Isn&#8217;t it ironic<\/span><\/h3>\n<p>Israeli computer security outfit Verint has confirmed that its servers were hit with ransomware.<\/p>\n<p>&#8220;The company has experienced a critical flaw that has affected local servers,&#8221; the biz said in a statement. &#8220;The company is working to contain and handle the situation, with the help of outside parties.&#8221;<\/p>\n<p>According to <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.globes.co.il\/news\/article.aspx?did=1001282731\">local media<\/a>, the company got a dose of Ryuk, a potent piece of ransomware thought to emanate from North Korea and used to help fund the dictatorship there. Thankfully, it looks as though Verint had backups ready, though it&#8217;s a useful warning to all that even security professionals sometimes get hit \u2013 so be prepared. Make regular offline backups, full as well as diffs. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7146\/top-5-threat-hunting-myths?td=wptl1810\">Top 5 Threat Hunting Myths<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/04\/23\/security_roundup_220419\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230;and here&#8217;s a quick summary of what&#8217;s been going down in infosec land Roundup\u00a0 Welcome back, Brits, from your Easter break \u2013 assuming you weren&#8217;t working or on-call over the four-day weekend.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26927,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-26926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Like that other bloke who rose from the grave, the El Reg security desk is back this week... 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Like that other bloke who rose from the grave, the El Reg security desk is back this week... 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-23T06:52:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Like that other bloke who rose from the grave, the El Reg security desk is back this week&#8230;\",\"datePublished\":\"2019-04-23T06:52:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/\",\"name\":\"Like that other bloke who rose from the grave, the El Reg security desk is back this week... 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg\",\"datePublished\":\"2019-04-23T06:52:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Like that other bloke who rose from the grave, the El Reg security desk is back this week&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Like that other bloke who rose from the grave, the El Reg security desk is back this week... 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/","og_locale":"en_US","og_type":"article","og_title":"Like that other bloke who rose from the grave, the El Reg security desk is back this week... 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-04-23T06:52:05+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Like that other bloke who rose from the grave, the El Reg security desk is back this week&#8230;","datePublished":"2019-04-23T06:52:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/","url":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/","name":"Like that other bloke who rose from the grave, the El Reg security desk is back this week... 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg","datePublished":"2019-04-23T06:52:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/like-that-other-bloke-who-rose-from-the-grave-the-el-reg-security-desk-is-back-this-week\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Like that other bloke who rose from the grave, the El Reg security desk is back this week&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26926"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26926\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26927"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}