Third-party software supplier breached leading to leak of doctors’ notes Around 15.8 million administrative files were stolen after attackers breached a software supplier to France’s health ministry.… This article has been indexed from The Register – Security Read the original…
Tag: The Register – Security
Gamers furious as Brit studio Cloud Imperium quietly admits to data breach
Slow disclosure and odd reassurance that exposing names and contact details won’t be a problem isn’t going down well Gamers are ready to unleash their mightiest virtual weapons and point them at British games studio Cloud Imperium, after it sat…
Phish of the day: Microsoft OAuth scams abuse redirects for malware delivery
Crims hope for payday from malicious payloads rather than stealing access tokens Microsoft has warned organizations about ongoing OAuth abuse scams that use phishing emails and URL redirects to infect victims’ machines with malware and take over their devices.… This…
Iran’s cyberwar has begun
‘Expect elevated activity for the foreseeable future’ Iranian hackers have launched spying expeditions, digital probes, and distributed denial of service (DDoS) attacks in the wake of the US and Israel launching missile strikes over the weekend, and security researchers urge…
UK Businesses told to brace cyber defenses amid Iran conflict risk
NCSC urges all to review posture as escalating tensions increase risk of indirect digital spillover The UK’s cybersecurity agency is warning British organizations to brace for potential digital blowback as the Middle East conflict spills further into the online world.……
Memory scalpers hunt scarce DRAM with bot blitz
We can remember it for you wholesale, and sell it back to you for big bucks Web scraping bots are increasing the pressure on the tech supply chain by scouring sites for DRAM, so their minders can snap up increasingly…
Scammers try to SIM-swap Dubai citizens hours after Iranian missile strikes
Vulnerable citizens targeted by criminals purporting to represent fake police crisis department Scammers targeted Dubai citizens mere hours after missiles struck the city, attempting to gain access to their bank accounts, police have warned.… This article has been indexed from…
UK government’s Vulnerability Monitoring System is working – fixes flow far faster
PLUS: Firefox adds XSS protection; Leadership turnover at CISA; FTC exempts some data collection Infosec In Brief DNS vulnerabilities are being addressed 84 percent faster in the UK public sector thanks to an automated vulnerability scanning system established as part…
UK govermnent’s Vulnerability Monitoring System is working – fixes flow far faster
PLUS: Firefox adds XSS protection; Leadership turnover at CISA; FTC exempts some data collection Infosec In Brief DNS vulnerabilities are being addressed 84 percent faster in the UK public sector thanks to an automated vulnerability scanning system established as part…
South Korea’s tax office apologizes for leaking seed phrase to seized crypto
Went from triumph at having busted tax dodgers to embarrassment at losing the proceeds South Korea’s National Tax Service has apologized after it leaked passwords to a stash of stolen crypto, which parties unknown used to make off with the…
Denizens of DEF CON are ‘fed up with government’
Jake Braun thinks hackers need to create a ‘Digital arsenal of democracy’ to defend us all Interview Hackers – especially Jake Braun – are “fed up with government.”… This article has been indexed from The Register – Security Read the…
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool
Credential and cryptocurrency theft, live surveillance, ransomware – an attacker’s Swiss Army knife A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks on Windows machines by bundling ransomware and data theft, along with credential…
Suspected Nork digital intruders caught breaking into US healthcare, education orgs
Who is knocking at the Dohdoor? Digital intruders with possible links to North Korea have been infecting US education and healthcare sectors with a never-before-seen backdoor since at least December, according to security researchers.… This article has been indexed from…
Ransomware payments cratered in 2025, but attacks surged to record highs
Smaller crews piled in as old names splintered and rebranded Ransomware payments cratered in 2025, but it seems like the cybercrooks launching the attacks didn’t get the memo.… This article has been indexed from The Register – Security Read the…
French DIY etailer ManoMano admits customer data stolen
Crooks claim they helped themselves to over 37M accounts during January hit on subcontractor French online marketplace ManoMano is warning customers their personal data was siphoned off after a cyberattack hit one of its customer support subcontractors – and criminals…
Cops back Dutch telco Odido after second wave of ShinyHunters leaks
Company refuses to pay ransom as attackers threaten larger daily dumps The Netherlands’ national police is backing Odido’s refusal to pay a ransom after ShinyHunters leaked a second round of records belonging to the telco.… This article has been indexed…
Rapid AI-driven development makes security unattainable, warns Veracode
Report claims more vulnerabilities created than fixed as remediation gap widens Veracode has posted its annual State of Software Security report, based on data from 1.6 million applications tested on its cloud platform, finding that more vulnerabilities are being created…
Scattered Lapsus$ Hunters auditioning female voices to sharpen social engineering
Telegram posts promise up to $1,000 per call as gang refines IT helpdesk ruse Prolific cybercrime crew Scattered Lapsus$ Hunters (SLSH) is reportedly recruiting women in the hope of improving its social engineering success.… This article has been indexed from…
Five Eyes warn: Patch your Cisco SD-WAN or risk root takeover
A rare joint alert from all five spy agencies means serious business The Five Eyes intelligence alliance is urgently warning defenders to patch two Cisco Catalyst SD-WAN vulnerabilities used in attacks.… This article has been indexed from The Register –…
Claude collaboration tools left the door wide open to remote code execution
Anthropic fixed the flaws – but the AI-enabled attack surfaces remain Security vulnerabilities in Claude Code could have allowed attackers to remotely execute code on users’ machines and steal API keys by injecting malicious configurations into repositories, and then waiting…