Espionage? Botnets? Trying to exploit a zero-day? Someone or something is probing devices made by Juniper Networks and Palo Alto Networks, and researchers think it could be evidence of espionage attempts, attempts to build a botnet, or an effort to…
Category: The Register – Security
EU: These are scary times – let’s backdoor encryption!
ProtectEU plan wants to have its cake and eat it too The EU has issued its plans to keep the continent’s denizens secure and among the pages of bureaucratese are a few worrying sections that indicate the political union wants…
Heterogeneous stacks, ransomware, and ITaaS: A DR nightmare
Recovery’s never been harder in today’s tangled, outsourced infrastructure Comment Disaster recovery is getting tougher as IT estates sprawl across on-prem gear, public cloud, SaaS, and third-party ITaaS providers. And it’s not floods or fires causing most outages anymore –…
Customer info allegedly stolen from Royal Mail, Samsung via compromised supplier
Stamp it out: Infostealer malware at German outfit may be culprit Britain’s Royal Mail is investigating after a crew calling itself GHNA claimed it has put 144GB of the delivery giant’s data up for sale, perhaps after acquiring it with…
Raw Deel: Corporate spy admits role in espionage at HR software biz Rippling
Double-oh-sh… The name’s not Bond. It’s O’Brien – Keith O’Brien, now-former global payroll compliance manager at the Dublin, Ireland office of HR software-as-a-service maker Rippling.… This article has been indexed from The Register – Security Read the original article: Raw…
Crimelords at Hunters International tell lackeys ransomware too ‘risky’
Bosses say theft now the name of the game with a shift in tactics, apparent branding Big-game ransomware crew Hunters International says its criminal undertaking has become “unpromising, low-converting, and extremely risky,” and it is mulling shifting tactics amid an…
Crimelords at Hunters International told lackeys ransomware too ‘risky’
Bosses say theft now the name of the game with a shift in tactics, apparent branding Big-game ransomware crew Hunters International says its criminal undertaking has become “unpromising, low-converting, and extremely risky,” and it is mulling shifting tactics amid an…
Don’t let cyberattacks keep you down
Learn how Infinidat’s enterprise cyber storage solutions can enable near-immediate recovery Sponsored Post It’s not a question of if your organization gets hit by a cyberattack – only when, and how quickly it recovers.… This article has been indexed from…
Oracle’s masterclass in breach comms: Deny, deflect, repeat
Fallout shows how what you say must be central to disaster planning Opinion Oracle is being accused of poor incident comms as it reels from two reported data security mishaps over the past fortnight, amid a reluctance to publicly acknowledge…
For healthcare orgs, disaster recovery means making sure docs can save lives during ransomware infection
Organizational, technological resilience combined defeat the disease that is cybercrime When IT disasters strike, it can become a matter of life and death for healthcare organizations – and criminals know it.… This article has been indexed from The Register –…
Oracle faces Texas-sized lawsuit over alleged cloud snafu and radio silence
Victims expect to spend considerable time and money over privacy incident, lawyers argue Specialist class action lawyers have launched proceedings against Oracle in Texas over two alleged data breaches.… This article has been indexed from The Register – Security Read…
One of the last of Bletchley Park’s quiet heroes, Betty Webb, dies at 101
Kept quiet for 30 years before becoming an ‘unrivalled advocate’ for the site Obit Betty Webb MBE, one of the team who worked at the code-breaking Bletchley Park facility during the Second World War, has died at the age of…
Apple belatedly patches actively exploited bugs in older OSes
Cupertino already squashed ’em in more recent releases – which this week get a fresh round of fixes Apple has delivered a big batch of OS updates, some of which belatedly patch older versions of its operating systems to address…
North Korea’s fake tech workers now targeting European employers
With help from UK operatives, because it’s getting tougher to run the scam in the USA North Korea’s scamming, thieving, and AI-abusing fake IT workers are increasingly targeting European employers.… This article has been indexed from The Register – Security…
Forget Signal. National Security Adviser Waltz now accused of using Gmail for work
But his emails! Sharing them with Google! Senior members of the US National Security Council, including the White House national security adviser Michael Waltz, have been accused of using their personal Gmail accounts to exchange sensitive information.… This article has…
Microsoft to mark five decades of Ctrl-Alt-Deleting the competition
Copilot told us that half a century is 25 years. It feels much longer Microsoft will officially hit the half-century mark on Friday as the Windows giant turns 50 years old. What do you consider the highs and lows of…
Google makes end-to-end encrypted Gmail easy for all – even Outlook users
The UK government must be thrilled Google will soon offer end-to-end encrypted (E2EE) email for all users, even those who do not use Google Workspace, and says it’ll do so without imposing any undue stress on IT admins.… This article…
UK threatens £100K-a-day fines under new cyber bill
Tech secretary reveals landmark legislation’s full details for first time The UK’s technology secretary revealed the full breadth of the government’s Cyber Security and Resilience (CSR) Bill for the first time this morning, pledging £100,000 ($129,000) daily fines for failing…
GCHQ intern took top secret spy tool home, now faces prison
Not exactly Snowden levels of skill A student at Britain’s top eavesdropping government agency has pleaded guilty to taking sensitive information home on the first day of his trial.… This article has been indexed from The Register – Security Read…
CISA spots spawn of Spawn malware targeting Ivanti flaw
Resurge an apt name for malware targeting hardware maker that has security bug after security bug Owners of Ivanti’s Connect Secure, Policy Secure, and ZTA Gateway products have a new strain of malware to fend off, according to the US…
Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed
1990s incident response in 2025 Two Oracle data security breaches have been reported in the past week, and the database goliath not only remains reluctant to acknowledge the disasters publicly – it may be scrubbing the web of evidence, too.……
Top cybersecurity boffin, wife vanish as FBI raids homes
Indiana Uni rm -rf online profile while agents haul boxes of evidence A tenured computer security professor at Indiana University and his university-employed wife have not been seen publicly since federal agents raided their homes late last week.… This article…
Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence vanishes
1990s incident response in 2025 Two Oracle data security breaches have been reported in the past week, and the database goliath not only remains reluctant to acknowledge the disasters publicly – it may be scrubbing the web of evidence, too.……
Oracle Cloud security SNAFU: IT giant accused of pedantry as evidence vanishes
1990s incident response in 2025 Two Oracle data security breaches have been reported in the past week, and the database goliath not only remains reluctant to acknowledge the disasters publicly – it may be scrubbing the web of evidence, too.……
Check Point confirms breach, but says it was ‘old’ data and crook made ‘false’ claims
Explanation leaves a ‘lot of questions unanswered,’ says infosec researcher A digital burglar is claiming to have nabbed a trove of “highly sensitive” data from Check Point – something the American-Israeli security biz claims is a huge exaggeration.… This article…
Cloud security explained: What’s left exposed?
Think AWS has security covered? Think again. Discover real-world examples of what it doesn’t secure and how to protect your environment Advertorial AWS customers might assume that security is taken care of for them – however, this is a dangerous…
China cracks down on personal information collection. No, seriously
PLUS: Indonesia crimps social media, allows iPhones; India claims rocket boost; In-flight GenAI for Japan Airlines Asia In Brief China last week commenced a crackdown on inappropriate collection and subsequent use of personal information.… This article has been indexed from…
Oracle Health reportedly warns of info leak from legacy server
PLUS: OpenAI bumps bug bounties bigtime; INTERPOL arrests 300 alleged cyber-scammers; And more! Infosec in brief Oracle Health appears to have fallen victim to an info stealing attack that has led to patient data stored by American hospitals being plundered.……
Malware in Lisp? Now you’re just being cruel
Miscreants warming to Delphi, Haskell, and the like to evade detection Malware authors looking to evade analysis are turning to less popular programming languages like Delphi or Haskell.… This article has been indexed from The Register – Security Read the…
Cardiff’s children’s chief confirms data leak 2 months after cyber risk was ‘escalated’
Department director admits Welsh capital’s council still trying to get heads around threat of dark web leaks Cardiff City Council’s director of children’s services says data was leaked or stolen from the organization, although she did not clarify how or…
After Chrome patches zero-day used to target Russians, Firefox splats similar bug
Single click on a phishing link in Google browser blew up sandbox on Windows Google pushed out an emergency patch for Chrome on Windows this week to stop attackers exploiting a sandbox-breaking zero-day vulnerability, seemingly used by snoops to target…
Cyber-crew claims it cracked American cableco, releases terrible music video to prove it
WOW! DID! SOMEONE! REALLY! STEAL! DATA! ON! 400K! USERS?! A cyber-crime ring calling itself Arkana has made a cringe music video to boast of an alleged theft of subscriber account data from Colorado-based cableco WideOpenWest (literally, WOW!)… This article has…
China’s FamousSparrow flies back into action, breaches US org after years off the radar
Crew also cooked up two fresh SparrowDoor backdoor variants, says ESET The China-aligned FamousSparrow crew has resurfaced after a long period of presumed inactivity, compromising a US financial-sector trade group and a Mexican research institute. The gang also likely targeted…
Security shop pwns ransomware gang, passes insider info to authorities
Researchers say ‘proactive’ approach is needed to combat global cybercrime Here’s one you don’t see every day: A cybersecurity vendor is admitting to breaking into a notorious ransomware crew’s infrastructure and gathering data it relayed to national agencies to help…
CrushFTP CEO’s feisty response to VulnCheck’s CVE for critical make-me-admin bug
Screenshot shows company head unhappy, claiming ‘real CVE is pending’ CrushFTP’s CEO is not happy with VulnCheck after the CVE numbering authority (CNA) released an unofficial ID for the critical vulnerability in its file transfer tech disclosed almost a week…
UK’s first permanent facial recognition cameras installed in South London
As if living in Croydon wasn’t bad enough The Metropolitan Police has confirmed its first permanent installation of live facial recognition (LFR) cameras is coming this summer and the lucky location will be the South London suburb of Croydon.… This…
Ransomwared NHS software supplier nabs £3M discount from ICO for good behavior
Data stolen included checklist for medics on how to get into vulnerable people’s homes The UK’s data protection watchdog is dishing out a £3.07 million ($3.95 million) fine to Advanced Computer Software Group, whose subsidiary’s security failings led to a…
Signalgate storm intensifies as journalist releases full secret Houthi airstrike chat
So F-18 launch times, weapons, drone support aren’t classified now … who knew? The Atlantic’s editor-in-chief who was inadvertently added to a Signal group in which the US Secretary of Defense, Vice President, and others discussed secret military plans has…
US defense contractor cops to sloppy security, settles after infosec lead blows whistle
MORSE to pay — .. .-.. .-.. .. — -. … for failing to meet cyber-grade A US defense contractor will cough up $4.6 million to settle complaints it failed to meet cybersecurity requirements on military contracts and knowingly submitted…
Files stolen from NSW court system, including restraining orders for violence
Victims’ details at risk after criminals download 9,000 files from court database Australian police are currently investigating the theft of “sensitive” data from a New South Wales court system after they confirmed approximately 9,000 files were stolen.… This article has…
Credible nerd says stop using atop, doesn’t say why, everyone panics
Bad news about the Linux system monitor may be on the way Veteran sysadmin and tech blogger Rachel Kroll posted a cryptic warning yesterday about a popular Linux system monitoring tool. Maybe it’s better to be safe than sorry.… This…
NCSC taps influencers to make 2FA go viral
Who knew social media stars had a role to play in building national cyber resilience? The world’s biggest brands have benefited from influencer marketing for years – now the UK’s National Cyber Security Centre (NCSC) has hopped on the bandwagon…
There are perhaps 10,000 reasons to doubt Oracle Cloud’s security breach denial
Customers come forward claiming info was swiped from prod Oracle Cloud’s denial of a digital break-in is now in clear dispute. A infosec researcher working on validating claims that the cloud provider’s login servers were compromised earlier this year says…
Infosec pro Troy Hunt HasBeenPwned in Mailchimp phish
16,000 stolen records pertain to former and active mail subscribers Infosec veteran Troy Hunt of HaveIBeenPwned fame is notifying thousands of people after phishers scooped up his Mailchimp mailing list.… This article has been indexed from The Register – Security…
You know that generative AI browser assistant extension is probably beaming everything to the cloud, right?
Just an FYI, like Generative AI assistants packaged up as browser extensions harvest personal data with minimal safeguards, researchers warn.… This article has been indexed from The Register – Security Read the original article: You know that generative AI browser…
VanHelsing ransomware emerges to put a stake through your Windows heart
There’s only one rule – don’t attack Russia, duh Check Point has spotted a fresh ransomware-as-a-service crew in town: VanHelsing, touting a cross-platform locker targeting Microsoft Windows, Linux, and VMware ESXi systems, among others. But so far, only Windows machines…
Hm, why are so many DrayTek routers stuck in a bootloop?
Time to update your firmware, if you can, to one with the security fixes, cough cough DrayTek router owners in the UK and beyond had a pretty miserable weekend after some ISPs began to notice a lot of their customers’…
Public-facing Kubernetes clusters at risk of takeover thanks to Ingress-Nginx flaw
How many K8s systems are sat on the internet front porch like that … Oh, thousands, apparently Cloudy infosec outfit Wiz has discovered serious vulnerabilities in the admission controller component of Ingress-Nginx Controller that could allow the total takeover of…
OTF, which backs Tor, Let’s Encrypt and more, sues to save funding from Trump cuts
Kari, OK, we’ll see you in court An organization that bankrolls various internet security projects has asked a Washington DC court to prevent the Trump administration from cancelling its federal funding – and expressed fears that if the cash stops…
Top Trump officials text classified Yemen airstrike plans to journo in Signal SNAFU
Massive OPSEC fail from the side who brought you ‘lock her up’ Senior Trump administration officials used the messaging app Signal to discuss secret government business – including detailed plans to attack Houthi rebels in Yemen – and accidentally invited…
FCC on the prowl for Huawei and other blocked Chinese makers in America
Be vewy vewy quiet, I’m hunting rackets The FCC is investigating whether Chinese manufacturers black-listed on its so-called Covered List – including Huawei – are still somehow doing business in America, either by misreading the rules or willfully ignoring them.……
As nation-state hacking becomes ‘more in your face,’ are supply chains secure?
Ex-US Air Force officer says companies shouldn’t wait for govt mandates Interview Former US Air Force cyber officer Sarah Cleveland worries about the threat of a major supply-chain attack from China or another adversarial nation. So she installed solar panels…
AI agents swarm Microsoft Security Copilot
Looking to sort through large volumes of security info? Redmond has your backend Microsoft’s Security Copilot is getting some degree of agency, allowing the underlying AI model to interact more broadly with the company’s security software to automate various tasks.……
23andMe’s genes not strong enough to avoid Chapter 11
CEO steps down after multiple failed attempts to take the DNA testing company private Beleaguered DNA testing biz 23andMe – hit by a massive cyber attack in 2023 – is filing for bankruptcy protection in the US following years of…
Is Washington losing its grip on crypto, or is it a calculated pivot to digital dominance?
It’s been a very busy week for Digicash Donald’s administration Analysis Is the US retreating from its hardline stance on crypto? On Friday, the US Treasury Department lifted sanctions imposed on notorious crypto mixer Tornado Cash, once accused of washing…
Microsoft tastes the unexpected consequences of tariffs on time
Throw a spanner in the works, best get good at fixing things. Now, where did you put that spanner? Opinion Never attribute to malice that which is adequately explained by stupidity. This works well in sane times, less so when…
Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns
PLUS: Russian bug-buyers seeks Telegram flaws; Another WordPress security mess; NIST backlog grows; and more! Infosec In Brief Organized crime networks are now reliant on digital tech for most of their activities according to Europol, the European agency that fights…
China bans compulsory facial recognition and its use in private spaces like hotel rooms
PLUS: Zoho’s Ulaa anointed India’s most patriotic browser; Typhoon-like gang targets Taiwan; Japan debates offensive cyber-ops; and more Asia In Brief China’s Cyberspace Administration and Ministry of Public Security have outlawed the use of facial recognition without consent.… This article…
Oracle Cloud says it’s not true someone broke into its login servers and stole data
Despite evidence to the contrary as alleged pilfered info goes on sale Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information stolen.… This article has been indexed from The Register…
Ex-NSA boss: Election security focus helped dissuade increase in Russian meddling with US
Plus AI in the infosec world, why CISA should know its place, and more Interview Russia appears to be having second thoughts on how aggressively, or at least how visibly, it attempts to influence American elections, according to a former…
Ex-NSA boss: Good news. Election security focus helped dissuade increase in Russian meddling with US
Plus AI in the infosec world, why CISA should know its place, and more Interview Russia appears to be having second thoughts on how aggressively, or at least how visibly, it attempts to influence American elections, according to a former…
AdTech CEO whose products detected fraud jailed for financial fraud
Made up revenue and pretended to use non-existent data The former CEO of Kubient, an advertising tech company that developed a cloudy product capable of detecting fraudulent ads, has been jailed for fraud.… This article has been indexed from The…
Paragon spyware deployed against journalists and activists, Citizen Lab claims
Plus: Customer info stolen from ‘parental control’ software slinger SpyX; F-35 kill switch denied Infosec newsbytes Israeli spyware maker Paragon Solutions pitches its tools as helping governments and law enforcement agencies to catch criminals and terrorists, but a fresh Citizen…
Capital One cracker could be sent back to prison after judges rule she got off too lightly
Feds want harsher sentence for Paige Thompson, who pinched 100M customer records Paige Thompson, the perpetrator of the Capital One data theft, may be sent back behind bars after an appeals court ruled her sentence of time served plus probation…
Dept of Defense engineer took home top-secret docs, booked a fishing trip to Mexico – then the FBI showed up
So much for that vacation A US Department of Defense electrical engineer has turned his world upside down after printing 155 pages from 20 documents, all of which were marked top secret and classified, from his DoD workspace, brought them…
Infoseccers criticize Veeam over critical RCE vulnerability and a failing blacklist
Palming off the blame using an ‘unknown’ best practice didn’t go down well either In patching the latest critical remote code execution (RCE) bug in Backup and Replication, software shop Veeam is attracting criticism from researchers for the way it…
Too many software supply chain defense bibles? Boffins distill advice
How to avoid another SolarWinds, Log4j, and XZ Utils situation Organizations concerned about software supply chain attacks should focus on role-based access control, system monitoring, and boundary protection, according to a new preprint paper on the topic.… This article has…
The post-quantum cryptography apocalypse will be televised in 10 years, says UK’s NCSC
Wow, a government project that could be on time for once … cos it’s gonna be wayyyy more than a decade The UK’s National Cyber Security Centre (NCSC) today started the post-quantum cryptography (PQC) countdown clock by claiming organizations have…
Attackers swipe data of 500k+ people from Pennsylvania teachers union
SSNs, payment details, and health info too The Pennsylvania State Education Association (PSEA) says a July 2024 “security incident” exposed sensitive personal data on more than half a million individuals, including financial and health info.… This article has been indexed…
Names, bank info, and more spills from top sperm bank
Cyber-crime is officially getting out of hand One of the world’s largest sperm banks, California Cryobank, is in a sticky situation: It’s had to tell folks their sensitive information, including names and bank account numbers, may have been stolen from…
IBM scores perfect 10 … vulnerability in mission-critical OS AIX
Big Blue’s workstation workhorse patches hole in network installation manager that could let the bad guys in IBM “strongly recommends” customers running its Advanced Interactive eXecutive (AIX) operating system apply patches after disclosing two critical vulnerabilities, one of which has…
Ex-US Cyber Command chief: Europe and 5 Eyes can’t fully replicate US intel
Cue deepening existential European dread as Rest of World contemplates Trump turning off the info tap If the United States stopped sharing cyber-threat intel with Ukraine, its European allies and the rest of the Five Eyes nations wouldn’t be able…
Show top LLMs buggy code and they’ll finish off the mistakes rather than fix them
One more time, with feeling … Garbage in, garbage out, in training and inference Researchers have found that large language models (LLMs) tend to parrot buggy code when tasked with completing flawed snippets.… This article has been indexed from The…
CISA fires, now rehires and immediately benches security crew on full pay
DOGE efficiency in action The upheaval at the US government’s Cybersecurity and Infrastructure Security Agency, aka CISA, took another twist on Tuesday, as it moved to reinstate staffers it had fired over the past few weeks – specifically those still…
US tech jobs outlook clouded by DOGE cuts, Trump tariffs
Hiring remains relatively strong as analysts warn of slowdown A pair of reports on tech sector employment trends in the United States suggest out-of-work techies right now have relatively decent prospects, but economic uncertainty and rapid policy changes initiated by…
Microsoft isn’t fixing 8-year-old shortcut exploit abused for spying
‘Only’ a local access bug but important part of N Korea, Russia, and China attack picture An exploitation avenue found by Trend Micro has been used in an eight-year-long spying campaign, but there’s no sign of a fix from Microsoft,…
Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos
Ad giant’s cloudy arm to pay $30B in security shop deal Wiz security researchers think they’ve found the root cause of the GitHub supply chain attack that unfolded over the weekend, and they say that a separate attack may have…
UK wants dirt on data brokers before criminals get there first
Govt wants to learning mistakes of serially breached record holders so it can, er, liberalize data sharing regs under new law The UK government is inviting experts to provide insights about the data brokerage industry and the potential risks it…
Extortion crew threatened to inform Edward Snowden (?!) if victim didn’t pay up
Don’t laugh. This kind of warning shows crims are getting desperate Dark web analysts at infosec software vendor Fortra have discovered an extortion crew named Ox Thief that threatened to contact Edward Snowden if a victim didn’t pay to protect…
‘Dead simple’ hijacking hole in Apache Tomcat ‘now actively exploited in the wild’
One PUT request, one poisoned session file, and the server’s yours A trivial flaw in Apache Tomcat that allows remote code execution and access to sensitive files is said to be under attack in the wild within a week of…
Court filing: DOGE aide broke Treasury policy by emailing unencrypted database
More light shed on what went down with Marko Elez, thanks to NY AG and co’s lawsuit A now-former DOGE aide violated US Treasury policy by emailing an unencrypted database containing people’s private information to two Trump administration officials, according…
Amazon to kill off local Alexa processing, all voice requests shipped to the cloud
Web souk says Echo hardware doesn’t have the oomph for next-gen AI anyway Come March 28, those who opted to have their voice commands for Amazon’s AI assistant Alexa processed locally on their Echo devices will lose that option, with…
Amazon boots local Alexa processing: All your voice requests shipped to the cloud
Web souk says Echo hardware doesn’t have the oomph for next-gen AI anyway Come March 28, those who opted to have their voice commands for Amazon’s AI assistant Alexa processed locally on their Echo devices will lose that option, with…
GitHub supply chain attack spills secrets from 23,000 projects
Large organizations among those cleaning up the mess It’s not such a happy Monday for defenders wiping the sleep from their eyes only to deal with the latest supply chain attack.… This article has been indexed from The Register –…
UK government to open £16B IT services competition after 6-month delay
Technology Services 4 framework expands by £4B, with procurement to begin this week UK government is set to crack open the pork barrel for up to £16 billion in contracts for a range of IT services. The buying framework was…
Microsoft wouldn’t look at a bug report without a video. Researcher maliciously complied
Maddening techno loop, Zoolander reference, and 14 minutes of time wasted A vulnerability analyst and prominent member of the infosec industry has blasted Microsoft for refusing to look at a bug report unless he submitted a video alongside a written…
FCC stands up Council on National Security to fight China in ways that CISA used to
PLUS: Alleged Garantex admin arrested in India; Google deletes more North Korean malware Infosec In Brief United States Federal Communications Commission chair Brendan Carr has unveiled plans to form a Council on National Security that will combat foreign threats to…
Apple’s alleged UK encryption battle sparks political and privacy backlash
National security defense being used to keep appeal behind closed doors US politicians and privacy campaigners are calling for the private hearing between Apple and the UK government regarding its alleged encryption-busting order to be aired in public.… This article…
New kids on the ransomware block channel Lockbit to raid Fortinet firewalls
It’s March already and you haven’t patched? Researchers are tracking a newly discovered ransomware group with suspected links to LockBit after a series of intrusions were reported starting in January.… This article has been indexed from The Register – Security…
Dems ask federal agencies for reassurance DOGE isn’t feeding data into AI willy-nilly
Pouring sensitive info into unapproved, unaccountable, unsafe models would be a ‘severe’ cybersecurity fail House Democrats have sent letters to 24 federal agencies asking for assurances that Elon Musk’s DOGE team is not feeding sensitive government data into “unapproved and…
Google says it’s rolling out a fix for stricken Chromecasts
It’ll take a few days, give or take your situation Google has told The Register it’s beginning to roll out a fix for Chromecast devices that were bricked due to an expired security certificate authority. We’re assured this deployment will…
That ‘angry guest’ email from Booking.com? It’s a scam, not a 1-star review
Phishers check in, your credentials check out, Microsoft warns An ongoing phishing campaign disguised as a Booking.com email casts keystroke and credential-stealing malware into hospitality employees’ inboxes for financial fraud and theft, according to Microsoft Threat Intelligence.… This article has…
CISA: We didn’t fire our red team, we just unhired a bunch of them
Agency tries to save face as it also pulls essential funding for election security initiatives The US cybersecurity agency is trying to save face by seeking to clear up what it’s calling “inaccurate reporting” after a former senior pentester claimed…
DeepSeek can be gently persuaded to spit out malware code
It might need polishing, but a useful find for any budding cybercrooks out there DeepSeek’s flagship R1 model is capable of generating a working keylogger and basic ransomware code, just as long as a techie is on hand to tinker…
Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand
Feds warn gang still rampant and now cracked 300+ victims around the world A crook who distributes the Medusa ransomware tried to make a victim cough up three payments instead of the usual two, according to a government advisory on…
Get off that old Firefox by Friday or you’ll be sorry, says Moz
Root cert expiry may bring breakage or worse for add-ons, media playback, and more If you’re running an outdated version of Firefox, update by Friday or risk broken add-ons, failing DRM-protected media playback, and other errors, due to an expiring…
Expired Juniper routers find new life – as Chinese spy hubs
Fewer than 10 known victims, but Mandiant suspects others compromised, too Chinese spies have for months exploited old Juniper Networks routers, infecting the buggy gear with custom backdoors and gaining root access to the compromised devices.… This article has been…
This is the FBI, open up. China’s Volt Typhoon is on your network
Power utility GM talks to El Reg about getting that call and what happened next Nick Lawler, general manager of the Littleton Electric Light and Water Departments (LELWD), was at home one Friday when he got a call from the…
UK must pay cyber pros more than its Prime Minister, top civil servant says
Leaders call for fewer contractors and more top talent installed across government Senior officials in the UK’s civil service understand that future cyber hires in Whitehall will need to be paid a salary higher than that of the Prime Minister…
Choose your own Patch Tuesday adventure: Start with six zero-day fixes, or six critical flaws
Microsoft tackles 50-plus security blunders, Adobe splats 3D bugs, and Apple deals with a doozy Patch Tuesday Microsoft’s Patch Tuesday bundle has appeared, with a dirty dozen flaws competing for your urgent attention – six of them rated critical and…