Went from triumph at having busted tax dodgers to embarrassment at losing the proceeds South Korea’s National Tax Service has apologized after it leaked passwords to a stash of stolen crypto, which parties unknown used to make off with the…
Category: The Register – Security
Denizens of DEF CON are ‘fed up with government’
Jake Braun thinks hackers need to create a ‘Digital arsenal of democracy’ to defend us all Interview Hackers – especially Jake Braun – are “fed up with government.”… This article has been indexed from The Register – Security Read the…
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool
Credential and cryptocurrency theft, live surveillance, ransomware – an attacker’s Swiss Army knife A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks on Windows machines by bundling ransomware and data theft, along with credential…
Suspected Nork digital intruders caught breaking into US healthcare, education orgs
Who is knocking at the Dohdoor? Digital intruders with possible links to North Korea have been infecting US education and healthcare sectors with a never-before-seen backdoor since at least December, according to security researchers.… This article has been indexed from…
Ransomware payments cratered in 2025, but attacks surged to record highs
Smaller crews piled in as old names splintered and rebranded Ransomware payments cratered in 2025, but it seems like the cybercrooks launching the attacks didn’t get the memo.… This article has been indexed from The Register – Security Read the…
French DIY etailer ManoMano admits customer data stolen
Crooks claim they helped themselves to over 37M accounts during January hit on subcontractor French online marketplace ManoMano is warning customers their personal data was siphoned off after a cyberattack hit one of its customer support subcontractors – and criminals…
Cops back Dutch telco Odido after second wave of ShinyHunters leaks
Company refuses to pay ransom as attackers threaten larger daily dumps The Netherlands’ national police is backing Odido’s refusal to pay a ransom after ShinyHunters leaked a second round of records belonging to the telco.… This article has been indexed…
Rapid AI-driven development makes security unattainable, warns Veracode
Report claims more vulnerabilities created than fixed as remediation gap widens Veracode has posted its annual State of Software Security report, based on data from 1.6 million applications tested on its cloud platform, finding that more vulnerabilities are being created…
Scattered Lapsus$ Hunters auditioning female voices to sharpen social engineering
Telegram posts promise up to $1,000 per call as gang refines IT helpdesk ruse Prolific cybercrime crew Scattered Lapsus$ Hunters (SLSH) is reportedly recruiting women in the hope of improving its social engineering success.… This article has been indexed from…
Five Eyes warn: Patch your Cisco SD-WAN or risk root takeover
A rare joint alert from all five spy agencies means serious business The Five Eyes intelligence alliance is urgently warning defenders to patch two Cisco Catalyst SD-WAN vulnerabilities used in attacks.… This article has been indexed from The Register –…
Claude collaboration tools left the door wide open to remote code execution
Anthropic fixed the flaws – but the AI-enabled attack surfaces remain Security vulnerabilities in Claude Code could have allowed attackers to remotely execute code on users’ machines and steal API keys by injecting malicious configurations into repositories, and then waiting…
Google catches Beijing spies using Sheets to spread espionage across 4 continents
UNC2814 historically targets governments and telcos A China-linked crew found a unique formula for attacking telcos and government orgs across the Americas, Asia, and Africa in its latest round of intrusions. Google’s threat intelligence, along with unnamed industry partners, disrupted…
Fake ‘interview’ repos lure Next.js devs into running secret-stealing malware
Come for the coding test, stay for the C2 traffic Next.js developers are once again in the crosshairs as hackers seed malicious repositories disguised as legitimate projects, according to Microsoft, which said a limited set of those repos were directly…
Ex-L3Harris exec jailed 7 years for selling exploits to Russia
Former Trenchant manager profited millions from cyber tools reserved for the US The former general manager of L3Harris’s cyber arm will spend the next seven years behind bars for selling trade secrets to Russia.… This article has been indexed from…
Wynn Resorts takes attacker’s word for it that stolen staff data was deleted
Security pros question assurances as company offers staff credit monitoring Wynn Resorts has confirmed that employee data was stolen from its servers, and is taking the hackers’ word that they’ve since deleted it.… This article has been indexed from The…
OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents
Note to secret agents: ChatGPT is NOT a private diary A ChatGPT user with links to Chinese law enforcement tried to use the AI chatbot to run smear campaigns targeting the Japanese prime minister and other critics of the Chinese…
Threat intelligence supply chain is full of weak links, researchers find
And they’re being stressed by geopolitical concerns that threaten to slow important data-sharing efforts Researchers from Georgia Tech have found that the supply chain for threat intelligence data is susceptible to adversarial action, and proposed a method to improve data…
AI has gotten good at finding bugs, not so good at swatting them
Discovery is getting cheaper. Validation and patching aren’t What good is finding a hole if you can’t fix it? Anthropic last week talked up Claude Code’s improved ability to find software vulnerabilities and propose patches. But security researchers say that’s…
Patch these 4 critical, make-me-root SolarWinds bugs ASAP
SolarWinds + file transfer software = what attackers’ dreams are made of If you run SolarWinds’ Serv-U, you should patch promptly. Four critical vulnerabilities in the file transfer software can allow attackers to execute code as root.… This article has…
North Korea’s Lazarus Group targets healthcare orgs with Medusa ransomware
New ransomware of choice, same critical targets North Korea’s Lazarus Group appears to have added another tool to its kit. It has begun using Medusa ransomware in extortion attacks targeting at least one US healthcare organization and an unnamed victim…