KONNI espionage crew covertly abused Google’s Find My Device feature to remotely factory-reset Android phones North Korean state-backed spies have found a new way to torch evidence of their own cyber-spying – by hijacking Google’s “Find Hub” service to remotely…
Category: The Register – Security
EU’s reforms of GDPR, AI slated by privacy activists for ‘playing into Big Tech’s hands’
Lobbying efforts gain ground as proposals carve myriad holes into regulations Privacy advocates are condemning the European Commission’s leaked plans to overhaul digital privacy legislation, accusing officials of bypassing proper legislative processes to favor Big Tech interests.… This article has…
OWASP Top 10: Broken access control still tops app security list
Risk list highlights misconfigs, supply chain failures, and singles out prompt injection in AI apps The Open Worldwide Application Security Project (OWASP) just published its top 10 categories of application risks for 2025, its first list since 2021. It found…
Hitachi-owned GlobalLogic admits data stolen on 10k current and former staff
Clop’s Oracle EBS exploit spree shows no sign of slowing, claims nearly 30 more casualties in media, finance, and tech. Digital engineering outfit GlobalLogic says personal data from more than 10,000 current and former employees was exposed in the wave…
UK asks cyberspies to probe whether Chinese buses can be switched off remotely
Norwegian testers claim maker has remote access, while UK importer says supplier complies with the law UK governmental is working with the National Cyber Security Centre to understand and “mitigate” any risk that China-made imported electric buses could be remotely…
Cyber insurers paid out over twice as much for UK ransomware attacks last year
Massive increase in policy claims… and data doesn’t even cover the major attacks of 2025 The number of successful cyber insurance claims made by UK organizations shot up last year, according to the latest figures from the industry’s trade association.……
UK’s Ajax fighting vehicle arrives – years late and still sending crew to hospital
Continuous track of long awaited AFV hits the ground … and the terrain is pretty bumpy The British Army just received its first new armored fighting vehicle (AFV) for nearly three decades, but it is years late, hit by rising…
LLM side-channel attack could allow snoops to guess what you’re talking about
Encryption protects content, not context Mischief-makers can guess the subjects being discussed with LLMs using a side-channel attack, according to Microsoft researchers. They told The Register that models from some providers, including Anthropic, AWS, DeepSeek, and Google, haven’t been fixed,…
Critical federal cybersecurity funding set to resume as government shutdown draws to a close – for now
Resolution acquiesced to by 8 Dems includes CISA Act funding, layoff reversals, and could be easily undone The US Senate voted on Sunday to advance a short-term funding bill for the federal government, moving the country closer to ending its…
Phishers try to lure 5K Facebook advertisers with fake business pages
One company alone was hit with more than 4,200 emails More than 5,000 businesses that use Facebook for advertising were bombarded by tens of thousands of phishing emails in a credential- and data-stealing campaign.… This article has been indexed from…
Russian broker pleads guilty to profiting from Yanluowang ransomware attacks
Aleksei Volkov faces years in prison, may have been working with other crews A Russian national will likely face several years in US prison after pleading guilty to a range of offenses related to his work with ransomware crews.… This…
Allianz UK joins growing list of Clop’s Oracle E-Business Suite victims
Insurance giant’s UK arm says cybercriminals misattributed the real victim Allianz UK confirms it was one of the many companies that fell victim to the Clop gang’s Oracle E-Business Suite (EBS) attack after crims reported that they had attacked a…
As AI enables bad actors, how are 3,000+ teams responding?
Breaking down trends in exposure management with insightsfrom 3,000+ organizations and Intruder’s security experts Partner Content This year has shown just how quickly new exposures can emerge, with AI-generated code shipped before review, cloud sprawl racing ahead of controls, and…
Cisco creating new security model using 30 years of data describing cyber-dramas and saves
Doubles parameters to over 17 billion, to detect threats and recommend actions Exclusive Cisco is working on a new AI model that will more than double the number of parameters used to train its current flagship Foundation-Sec-8B.… This article has…
Microsoft teases agents that become ‘independent users within the workforce’
Licensing expert worries they’ll be out of control on day one Microsoft has teased what it’s calling “a new class” of AI agents “that operate as independent users within the enterprise workforce.”… This article has been indexed from The Register…
Data breach at Chinese infosec firm reveals cyber-weapons and target list
PLUS: India’s tech services exports growing fast; South Korea puts the bite on TXT spam; NTT gets into autonomous vehicles; and more! Asia In Brief Chinese infosec blog MXRN last week reported a data breach at a security company called…
Louvre’s pathetic passwords belong in a museum, just not that one
PLUS: CISA layoffs continue; Lawmakers criticize camera security; China to execute scammers; And more Infosec in brief There’s no indication that the brazen bandits who stole jewels from the Louvre attacked the famed French museum’s systems, but had they tried,…
Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
Esra’a Al Shafei spoke with The Reg about the spy tech ‘global trade’ interview Digital rights activist Esra’a Al Shafei found FinFisher spyware on her device more than a decade ago. Now she’s made it her mission to surveil the…
Previously unknown Landfall spyware used in 0-day attacks on Samsung phones
‘Precision espionage campaign’ began months before the flaw was fixed A previously unknown Android spyware family called LANDFALL exploited a zero-day in Samsung Galaxy devices for nearly a year, installing surveillance code capable of recording calls, tracking locations, and harvesting…
Cybercrims plant destructive time bomb malware in industrial .NET extensions
Multi-year wait for destruction comes to an end for mystery attackers Security experts have helped remove malicious NuGet packages planted in 2023 that were designed to destroy systems years in advance, with some payloads not due to hit until the…