Vulns in Dutch football club’s systems didn’t just expose data – they let outsiders play with accounts, and even lift stadium bans Dutch football giant AFC Ajax has admitted to a data breach after an attacker gained access to its…
Category: The Register – Security
Iran war drives urgent need to counter underwater attack drones
US and UK forces seeking tech tender with an April 3 deadline The UK and US are looking for technology to counter the threat posed by underwater drones to ships, harbors and other critical maritime infrastructure, and are asking industry…
Security boffins scoured the web and found hundreds of valid API keys
Global bank’s devs have some cleaning up to do after cloud creds found in website code Computer security boffins have conducted an analysis of 10 million websites and found almost 2,000 API credentials strewn across 10,000 webpages.… This article has…
Brit lawmaker targeted by AI deepfake fails to get answers from US Big Tech
Appearing before Parliament, Meta, Google and X struggle to explain how fake political video circulated for so long A member of the UK Parliament’s lower house who was the victim of a deepfake AI campaign this week had a rare…
UK wants to know if banning under-16s from social media does anything useful
300 families undergo 6-week trial to test impact on sleep, school, and home life The UK government will trial different levels of restrictions on social media for under-16s with the help of 300 families, alongside a public consultation that has…
Indian government probes CCTV espionage operation linked to Pakistan
Police found cameras pointing at infrastructure Indian authorities have reportedly ordered an audit of the nation’s CCTV cameras, after police uncovered what they claim was a Pakistan-backed surveillance operation.… This article has been indexed from The Register – Security Read…
AI supply chain attacks don’t even require malware…just post poisoned documentation
A proof-of-concept attack on Context Hub suggests there’s not much content santization A new service that helps coding agents stay up to date on their API calls could be dialing in a massive supply chain vulnerability.… This article has been…
Scammers have virtual smartphones on speed dial for fraud
They cleverly mimic most traits of a real phone Smartphones have fast become the basis of our digital identities, securing payment systems and bank accounts. Now virtual devices that pretend to be real handsets have become a key tool for…
Jen Easterly, cybersecurity’s ‘relentless optimist,’ hopes feds come back to RSAC next year
Ex-CISA boss also says no reason to panic about AI and security RSAC 2026 “Everybody feels massive FOMO if they don’t get to RSAC,” Jen Easterly says.… This article has been indexed from The Register – Security Read the original…
Only Trump can decide when cyberwar turns into real war
Four former NSA bosses walk onto the stage at RSAC… rsac 2026 There’s a theoretical red line with cyber warfare. Cross it, and the US will respond with a physical attack like missile strikes. And that line “is whatever the…
Enterprise PCs are unreliable, unpatched, and unloved compared to Macs
Omnissa telemetry suggests business buyers are loving Apple and Google End-user compute vendor Omnissa, the company formed by the spin-out of VMware’s virtual desktops, applications, and device management biz, has dug into the telemetry it collects from customers and painted…
EFF has a new boss to lead the fight against privacy-sucking forces of doom
Cyber rights org retools for the days of AI and unrestrained government interview The Electronic Frontier Foundation (EFF) on Tuesday appointed Nicole Ozer to succeed Cindy Cohn as the cyber rights group’s executive director when Cohn departs this summer.… This…
1K+ cloud environments infected following Trivy supply chain attack
Crims ‘creating a snowball effect’ across open source projects RSAC 2026 Thousands of organizations’ cloud environments have been infected with secret-stealing malware as a result of the Trivy supply-chain attack last week, and now the crims that compromised the open…
LiteLLM loses game of Trivy pursuit, gets compromised
Python interface for LLMs infected with malware via polluted CI/CD pipeline Two versions of LiteLLM, an open source interface for accessing multiple large language models, have been removed from the Python Package Index (PyPI) following a supply chain attack that…
HackerOne slams supplier for delayed breach notice after staff data exposed
Nearly 300 employees caught up in intrusion at benefits provider Navia Almost 300 HackerOne employees are caught up in a data breach, with the bug bounty biz slamming a third-party benefits provider for a weeks-long delay in notification.… This article…
New routers? Made abroad? Yeah, that’s going to be a no from Uncle Sam
Unfortunately, there aren’t many options unless you’re Starlink Citing national security fears, America is effectively banning any new consumer-grade network routers made abroad.… This article has been indexed from The Register – Security Read the original article: New routers? Made…
Russian initial access broker who fed ransomware crews gets 81 months in US prison
Aleksei Volkov sentenced after enabling attacks that cost victims millions A Russian national who sold the keys to corporate networks faces nearly seven years in a US prison after prosecutors tied his handiwork to a string of ransomware attacks costing…
Claude attacks were ‘Rorschach test’ for infosec community, scaring former NSA boss
‘It freakin’ worked’ says Rob Joyce – and shows how relentless AI agents can find holes humans miss RSAC 2026 The now-infamous Anthropic report about Chinese cyberspies abusing Claude AI to automate cyberattacks was a Rorschach test for the infosec…
Public-private partnerships vital in disrupting China’s Typhoons, says RSA panel with no government speakers
Washington content to be represented by actual empty chairs RSA 2026 Back in the day (circa 2023) when cybercrime group Scattered Spider and its help-desk voice-phishing calls were a relatively new threat, the feds considered pulling the government’s top cyber-threat…
Lightning-fast exploits make it essential to patch fast, ask questions later
Here’s where you ought to spend your security billable hours budget this year Strengthen your MFA policies, double-down on anti-phishing training, and for Jobs’ sake, patch all your vulns right away. The past year of intelligence collected by Cisco’s Talos…