Category: The Register – Security

Your car’s web browser may be on the road to cyber ruin

Study finds built-in browsers across gadgets often ship years out of date Web browsers for desktop and mobile devices tend to receive regular security updates, but that often isn’t the case for those that reside within game consoles, televisions, e-readers,…

Crypto crooks co-opt stolen AWS creds to mine coins

‘Within 10 minutes of gaining initial access, crypto miners were operational’ Your AWS account could be quietly running someone else’s cryptominer. Cryptocurrency thieves are using stolen Amazon account credentials to mine for coins at the expense of AWS customers, abusing…

Kim’s crypto thieving reached a record $2B in 2025

ByBit attack doing some seriously heavy lifting North Korea’s yearly cryptocurrency thefts have accelerated, with Kim’s state-backed cybercriminals plundering just over $2 billion worth of tokens in 2025.… This article has been indexed from The Register – Security Read the…

FBI dismantles alleged $70M crypto laundering operation

Justice Department claims unlicensed exchange funneled ransomware profits US feds have dismantled a crypto laundering service that they say helped cybercrooks wash tens of millions of dollars in dirty digital cash, seizing its servers and unsealing charges against an alleged…

UK surveillance law still full of holes, watchdog warns

Investigatory Powers Commissioner says reforms have failed to close oversight gaps The UK’s Investigatory Powers Act 2016 (IPA) has several regulatory gaps that must be plugged in future legislative reforms, according to Investigatory Powers Commissioner (IPC) Sir Brian Leveson.… This…

CEO spills the Tea about massive token farming campaigns

Plus: automated SBOMs, $250,000 bounties ahead interview  No good idea – like rewarding open source software developers and maintainers for their contributions – goes unabused by cybercriminals, and this was the case with the Tea Protocol and two token farming…

Attacks pummeling Cisco AsyncOS 0-day since late November

No timeline for a patch Suspected Chinese-government-linked threat actors have been battering a maximum-severity Cisco AsyncOS zero-day vulnerability in some Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances for nearly a month, and there’s no timeline…

NATO’s battle for cloud sovereignty: Speed is existential

Build a digital backbone faster than adversaries can evolve or lose the information war NATO is in an existential race to develop sovereign cloud-based technologies to underpin its mission, the alliance’s Assistant Secretary General for Cyber and Digital Transformation told…

NATO’s battle for cloud sovereignty: speed is existential

Build a digital backbone faster than adversaries can evovle or lose the information war NATO is in an existential race to develop sovereign cloud based technologies to underpin its mission, the alliance’s Assistant Secretary General for Cyber and Digital Transformation…

Microsoft security updates breaks MSMQ on older Win systems

Folder permission changes cause queue failures and misleading error messages, no real fix yet Microsoft has good news for administrators: while some organizations now pay for security updates on older Windows versions, the inconsistent quality remains free.… This article has…

China’s Ink Dragon hides out in European government networks

Misconfigured servers are in, 0-days out Chinese espionage crew Ink Dragon has expanded its snooping activities into European government networks, using compromised servers to create illicit relay nodes for future operations.… This article has been indexed from The Register –…