Plus: Excel hell, angst for Adobe fans, and life’s too Snort for Cisco Patch Tuesday The first Patch Tuesday of 2025 has seen Microsoft address three under-attack privilege-escalation flaws in its Hyper-V hypervisor, plus plenty more problems that deserve your…
Tag: The Register – Security
FBI wipes Chinese PlugX malware from thousands of Windows PCs in America
Hey, Xi: Zài jiàn! The FBI, working with French cops, obtained nine warrants to remotely wipe PlugX malware from thousands of Windows-based computers that had been infected by Chinese government-backed criminals, according to newly unsealed court documents.… This article has…
Snyk appears to deploy ‘malicious’ packages targeting Cursor for unknown reason
Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test Developer security company Snyk is at the center of allegations concerning the possible targeting or testing of Cursor, an AI…
It’s not just Big Tech: The UK’s Online Safety Act applies across the board
That niche forum running for 20 years – get ready, there’s work to do Analysis A little more than two months out from its first legal deadline, the UK’s Online Safety Act is causing concern among smaller online forums caught…
UK floats ransomware payout ban for public sector
Stronger proposals may also see private sector applying for a payment ‘license’ A total ban on ransomware payments across the public sector might actually happen after the UK government opened a consultation on how to combat the trend of criminals…
Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used
Ransomware ‘not off the table,’ Arctic Wolf threat hunter tells El Reg Miscreants running a “mass exploitation campaign” against Fortinet firewalls, which peaked in December, may be using an unpatched zero-day vulnerability to compromise the equipment, according to security researchers…
Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug
This is what happens when you publish PoCs immediately, hm? “Several cloud deployments” are already compromised following the disclosure of the maximum-severity vulnerability in Aviatrix Controller, researchers say.… This article has been indexed from The Register – Security Read the…
Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug
This is what happens when you publish PoCs immediately “Several cloud deployments” are already compromised following the disclosure of the maximum-severity vulnerability in Aviatrix Controller, researchers say.… This article has been indexed from The Register – Security Read the original…
Microsoft sues ‘foreign-based’ cyber-crooks, seizes sites used to abuse AI
Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful content,…
Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI
Crooks stole API keys, then started a hacking-as-a-service biz Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful content, and access to…
Azure, Microsoft 365 MFA outage locks out users across regions
It’s fixed, mostly, after Europeans had a manic Monday Microsoft’s multi-factor authentication (MFA) for Azure and Microsoft 365 (M365) was offline for four hours during Monday’s busy start for European subscribers.… This article has been indexed from The Register –…
Azure and M365 MFA outage locks out users across regions
It’s sorted out (mostly), but European users had a manic Monday Microsoft’s multi-factor authentication (MFA) for Azure and Microsoft 365 (M365) was offline for four hours during Monday’s busy start for European subscribers.… This article has been indexed from The…
NATO’s newest member comes out swinging following latest Baltic Sea cable attack
‘Sweden has changed,’ PM warns as trio of warships join defense efforts Sweden has committed to sending naval forces into the Baltic Sea following yet another suspected Russian attack on underwater cables in the region.… This article has been indexed…
Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days
‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up victims’ data before demanding a ransom…
Nominet probes network intrusion linked to Ivanti zero-day exploit
Unauthorized activity detected, but no backdoors found UK domain registrar Nominet is investigating a potential intrusion into its network related to the latest Ivanti zero-day exploits.… This article has been indexed from The Register – Security Read the original article:…
Europe coughs up €400 to punter after breaking its own GDPR data protection rules
PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more Infosec in brief Gravy Analytics, a vendor of location intelligence info for marketers which reached a settlement with US…
Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases
Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US Chinese cyber-spies who broke into the US Treasury Department also stole documents from officials investigating real-estate sales near American military…
Drug addiction treatment service admits attackers stole sensitive patient data
Details of afflictions and care plastered online BayMark Health Services, one of the biggest drug addiction treatment facilities in the US, says it is notifying some patients this week that their sensitive personal information was stolen.… This article has been…
Devs sent into security panic by ‘feature that was helpful … until it wasn’t’
Screenshot showed it wasn’t a possible attack – unless you qualify everything Google does as a threat On Call Velkomin, Vælkomin, Hoş geldin, and welcome to Friday, and therefore to another edition of On Call – The Register‘s end-of-week celebration…
Look for the label: White House rolls out ‘Cyber Trust Mark’ for smart devices
Beware the IoT that doesn’t get a security tag The White House this week introduced a voluntary cybersecurity labeling program for technology products so that consumers can have some assurance their smart devices aren’t spying on them.… This article has…