Hashtag-do-whatever-I-tell-you Cato Networks says it has discovered a new attack, dubbed “HashJack,” that hides malicious prompts after the “#” in legitimate URLs, tricking AI browser assistants into executing them while dodging traditional network and server-side defenses.… This article has been…
Tag: The Register – Security
Get ready for 2026, the year of AI-aided ransomware
State-backed crews are already poking at autonomous tools, Trend Micro warns Cybercriminals, including ransomware crews, will lean more heavily on agentic AI next year as attackers automate more of their operations, Trend Micro’s researchers believe.… This article has been indexed…
Clop’s Oracle EBS rampage reaches Dartmouth College
Uni notifies 1,400-plus Maine residents as zero-day fallout continues Dartmouth College has confirmed it’s the latest victim of Clop’s Oracle E-Business Suite (EBS) smash-and-grab.… This article has been indexed from The Register – Security Read the original article: Clop’s Oracle…
CISA warns spyware crews are breaking into Signal and WhatsApp accounts
Attackers sidestep encryption with spoofed apps and zero-click exploits to compromise ‘high-value’ mobile users CISA has warned that state-backed snoops and cyber-mercenaries are actively abusing commercial spyware to break into Signal and WhatsApp accounts, hijack devices, and quietly rummage through…
Russian spy ship theories sink after Orkney blackout traced to wind farm fault
Timing of Yantar’s visit sparked gossip, but engineers point to a misbehaving protection system Cock-up beats conspiracy most of the time, but that didn’t stop Orkney residents wondering if a Russian warship caused their two-hour power cut.… This article has…
ZTE, China Unicom Liaoning and Dalian Changhai Airport launch 5G-A ISAC private network to elevate low-altitude security and airport safety
Millimeter-wave ISAC and edge AI create unified sensing-communication capabilities for next-generation low-altitude security This article has been indexed from The Register – Security Read the original article: ZTE, China Unicom Liaoning and Dalian Changhai Airport launch 5G-A ISAC private network…
Fresh ClickFix attacks use Windows Update trick-pics to steal credentials
Poisoned PNGs contain malicious code A fresh wave of ClickFix attacks is using fake Windows update screens to trick victims into downloading infostealer malware.… This article has been indexed from The Register – Security Read the original article: Fresh ClickFix…
Praise Amazon for raising this service from the dead
The hardest part is admitting you were wrong, which AWS did. Opinion For years, Google has seemingly indulged a corporate fetish of taking products that are beloved, then killing them. AWS has been on a different kick lately: Killing services…
Ex-CISA officials, CISOs dispel ‘hacklore,’ spread cybersecurity truths
Don’t believe everything you read Afraid of connecting to public Wi-Fi? Terrified to turn your Bluetooth on? You may be falling for “hacklore,” tall tales about cybersecurity that distract you from real dangers. Dozens of chief security officers and ex-CISA…
Years-old bugs in open source tool left every major cloud open to disruption
Fluent Bit has 15B+ deployments … and 5 newly assigned CVEs A series of “trivial-to-exploit” vulnerabilities in Fluent Bit, an open source log collection tool that runs in every major cloud and AI lab, was left open for years, giving…
Intrusion at real estate finance biz sparks concern for big banks
SitusAMC rules out ransomware, but accounting records for major institutions potentially affected Real estate finance business SitusAMC says thieves sneaked into its systems earlier this month and made off with confidential client data.… This article has been indexed from The…
Shai-Hulud worm returns, belches secrets to 25K GitHub repos
Trojanized npm packages spread new variant that executes in pre-install phase, hitting thousands within days A self-propagating malware targeting node package managers (npm) is back for a second round, according to Wiz researchers who say that more than 25,000 developers…
FCC guts post-Salt Typhoon telco rules despite ongoing espionage risk
Months after China-linked spies burrowed into US networks, regulator tears up its own response The Federal Communications Commission (FCC) has scrapped a set of telecom cybersecurity rules introduced after the Salt Typhoon espionage campaign, reversing course on measures designed to…
CISA orders feds to patch Oracle Identity Manager zero-day after signs of abuse
Agencies have until December 12 to mitigate flaw that was likely exploited before Big Red released fix CISA has ordered US federal agencies to patch against an actively exploited Oracle Identity Manager (OIM) flaw within three weeks – a scramble…
Championing cyber security: the national UK cyber team’s journey at the European Cyber Security Challenge
Reflections on coaching, collaboration, and the pursuit of excellence in cyber security Partner Content From 6th to 10th October 2025, ten exceptional cyber enthusiasts proudly flew the flag for the United Kingdom in the European Cyber Security Challenge (ECSC), held…
Cryptology boffins’ association to re-run election after losing encryption key needed to count votes
The shoemaker’s children have new friends The International Association for Cryptologic Research will run a second election for new board members and other officers, after it was unable to complete its first poll due to a lost encryption key.… This…
70-hour work weeks no longer enough for Infosys founder, who praises China’s 996 culture
PLUS: Manga publishers win Cloudflare copyright case; India, EU to link payment systems; Storm over Australia’s weather website; And more! Asia In Brief Infosys co-founder Narayana Murthy has suggested Indian citizens should work even longer, suggesting his previous target of…
Weaponized file name flaw makes updating glob an urgent job
PLUS: CISA issues drone warning; China-linked DNS-hijacking malware; Prison for BTC Samourai; And more Infosec In Brief Researchers have urged users of the glob file pattern matching library to update their installations, after discovery of a years-old remote code execution…
ShinyHunters ‘does not like Salesforce at all,’ claims the crew accessed Gainsight 3 months ago
‘I have compromised other known OAuth apps,’ Shiny tells The Reg EXCLUSIVE ShinyHunters has claimed responsibility for the Gainsight breach that allowed the data thieves to snarf data from hundreds more Salesforce customers.… This article has been indexed from The…
Four charged over alleged plot to smuggle Nvidia AI chips into China
Prosecutors say front companies, falsified paperwork, and overseas drop points used to dodge US export rules Four people have been charged in the US with plotting to funnel restricted Nvidia AI chips into China, allegedly relying on shell firms, fake…