Patch now: Millions of Dell PCs with Broadcom chips vulnerable to attack black hat Psst, wanna steal someone's biometrics? Patches05 Aug 2025 | 7
Study finds humans not completely useless at malware detection Some pinpointed software nasties but were suspicious of printer drivers too Security05 Aug 2025 | 5
Cybercrooks attached Raspberry Pi to bank network and drained ATM cash Criminals used undocumented techniques and well-placed insiders to remotely withdraw money Research01 Aug 2025 | 26
Kremlin goons caught abusing ISPs to spy on Moscow-based diplomats, Microsoft says Russia spying on foreign embassies? Say it ain't so Security31 Jul 2025 | 61
Silk Typhoon spun a web of patents for offensive cyber tools, report says US court docs reveal that infamous Chinese snoops filed IP papers like tax returns Research31 Jul 2025 | 3
FBI: Watch out for these signs Scattered Spider is spinning its web around your org New malware, even better social engineering chops Cyber-crime29 Jul 2025 | 11
Security pros are drowning in threat-intel data and it's making everything more dangerous Plus, 60% don't have enough analysts to make sense of it CSO28 Jul 2025 | 17
Freelance dev shop Toptal caught serving malware after GitHub account break-in Malicious code lurking in over 5,000 downloads, says Socket researcher Cyber-crime25 Jul 2025 | 2
Coyote malware abuses Microsoft's UI Automation to hunt banking creds Some coyotes hunt squirrels, this one hunts users' financial apps Research24 Jul 2025 | 1
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog Computer scientist Peter Gutmann tells The Reg why it's 'bollocks' Research17 Jul 2025 | 96
Crims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkit Updated Someone's OVERSTEPing the mark Research16 Jul 2025 | 3
Nvidia A6000 GPUs flip memory bits if beaten by GPUHammer Rowhammer returns for more memory-meddling fun Research14 Jul 2025 | 4
How to trick ChatGPT into revealing Windows keys? I give up No, really, those are the magic words Research09 Jul 2025 | 101
Massive browser hijacking campaign infects 2.3M Chrome, Edge users updated These extensions weren't malware-laced from the start, researcher says Research08 Jul 2025 | 39
Phishing platforms, infostealers blamed as identity attacks soar Get your creds in order or risk BEC, ransomware attacks, orgs warned CSO07 Jul 2025 |
ChatGPT creates phisher’s paradise by recommending the wrong URLs for major companies Crims have cottoned on to a new way to lead you astray Research03 Jul 2025 | 24
Cl0p cybercrime gang's data exfiltration tool found vulnerable to RCE attacks Experts say they don't expect the MOVEit menace to do much about it Research02 Jul 2025 | 3
Computer vision research feeds surveillance tech as patent links spike 5× A bottomless appetite for tracking people as 'objects' Research25 Jun 2025 | 3
Boffins devise voice-altering tech to jam 'vishing' schemes To stop AI scam callers, break automatic speech recognition systems Research19 Jun 2025 | 42
Do you trust Xi with your 'private' browsing data? Apple, Google stores still offer China-based VPNs, report says Some trace back to an outfit under US export controls for alleged PLA links Research13 Jun 2025 | 33
Millions of age checks performed as UK Online Safey Act gets rolling But it's OK, claims Brit government, no personal data stored 'unless absolutely necessary'
Tech bro denied dev's hard-earned bonus for bug that overcharged a little old lady Who, Me? Startups aren't good at testing software, or respecting contracts
IT firing spree: Shrinking job market looks even worse after BLS revisions The payroll growth we thought we experienced in May and June? Gone, like tears in the rain
China’s botched Great Firewall upgrade invites attacks on its censorship infrastructure Attempts to censor QUIC traffic create chance to block access to offshore DNS resolvers
Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons Devs told to exercise 'extreme caution' with emails disguised as account update prompts
Microsoft briefly turned off Indian company’s cloud, perhaps due to EU sanctions on Russia Oh, the irony of Europe demonstrating the importance of the sovereign cloud it craves
Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor Updated 'Plague' malware has been around for months without tripping alarms
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies PXA Stealer pilfers data from nearly 40 browsers, including Chrome
Google agrees to pause AI workloads to protect the grid when power demand spikes On hot summer days, air conditioning is rather more important than search summaries
Lazarus Group rises again, this time with malware-laden fake FOSS Infosec In Brief PLUS: Slow MFA rollout costs Canucks $5m; Lawmakers ponder Stingray ban; MSFT tightens Teams; And more!
Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks The 16 other flagged issues are on customers, says CRM giant Research11 Jun 2025 |
Critical Wazuh bug exploited in growing Mirai botnet infection The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too Research10 Jun 2025 |
Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more Research10 Jun 2025 | 59
Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs SentinelOne discovered the campaign when they tried to hit the security vendor's own servers Research09 Jun 2025 | 17
ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist OpenAI boots accounts linked to 10 malicious campaigns Research06 Jun 2025 | 23
More than a hundred backdoored malware repos traced to single GitHub user Someone went to great lengths to prey on the next generation of cybercrooks Cyber-crime05 Jun 2025 | 12
AI kept 15-year-old zombie vuln alive, but its time is drawing near Researchers have come up with a fix for a path traversal bug first spotted in 2010 Research05 Jun 2025 | 27
Meta pauses mobile port tracking tech on Android after researchers cry foul Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins Research03 Jun 2025 | 54
8,000+ Asus routers popped in 'advanced' mystery botnet plot No formal attribution made but two separate probes hint at the same suspect Research29 May 2025 | 10
Ivanti makes dedicated fans of Chinese spies who just can't resist attacking its buggy kit If it ain't broke? Datacenter Networking Nexus23 May 2025 | 1
'Ongoing' Ivanti hijack bug exploitation reaches clouds Nothing like insecure code in security suites CSO21 May 2025 | 4
Intel's data-leaking Spectre defenses scared off yet again Updated ETH Zurich boffins exploit branch prediction race condition to steal info from memory, fixes have mild perf hit Research13 May 2025 | 5
You think ransomware is bad now? Wait until it infects CPUs RSAC Rapid7 threat hunter wrote a PoC. No, he's not releasing it Research11 May 2025 | 64
Ghost in the shell script: Boffins reckon they can catch bugs before programs run Go ahead, please do Bash static analysis CSO30 Apr 2025 | 39
Enterprise tech dominates zero-day exploits with no signs of slowdown As Big Tech gets used to the pain, smaller vendors urged to up their game Research29 Apr 2025 | 1
Darcula adds AI to its DIY phishing kits to help would-be vampires bleed victims dry Because coding phishing sites from scratch is a real pain in the neck Cyber-crime25 Apr 2025 | 5
Booby-trapped Alpine Quest Android app geolocates Russian soldiers Back of the nyet! Research24 Apr 2025 | 37
Who needs phishing when your login's already in the wild? Stolen credentials edge out email tricks for cloud break-ins because they're so easy to get CSO23 Apr 2025 | 11
A pot of $250K is now available to ransomware researchers, but it feeds a commercial product Security bods can earn up to $10K per report Research22 Apr 2025 | 3
Today's LLMs craft exploits from patches at lightning speed Erlang? Er, man, no problem. ChatGPT, Claude to go from flaw disclosure to actual attack code in hours AI Software Development Week21 Apr 2025 | 19
Hacking US crosswalks to talk like Zuck is as easy as 1234 Video AI-spoofed Mark joins fellow billionaires as the voice of the street – here's how it was probably done Bootnotes19 Apr 2025 | 88
Uncle Sam kills funding for CVE program. Yes, that CVE program Updated Because vulnerability management has nothing to do with national security, right? CSO16 Apr 2025 | 179
Chinese snoops use stealth RAT to backdoor US orgs – still active last week Let the espionage and access resale campaigns begin (again) Research15 Apr 2025 | 3
Scattered Spider stops the Rickrolls, starts the RAT race Despite arrests, eight-legged menace targeted more victims this year Research08 Apr 2025 | 5
As CISA braces for more cuts, threat intel sharing takes a hit Analysis How will 'gutting' civilian defense agency make American cybersecurity great again? Public Sector08 Apr 2025 | 11
For flux sake: CISA, annexable allies warn of hot DNS threat Shape shifting technique described as menace to national security CSO03 Apr 2025 | 5
Top cybersecurity boffin, wife vanish as FBI raids homes Updated Indiana Uni rm -rf online profiles while agents haul boxes of evidence Research31 Mar 2025 | 21
Malware in Lisp? Now you're just being cruel Miscreants warming to Delphi, Haskell, and the like to evade detection Research29 Mar 2025 | 56
You know that generative AI browser assistant extension is probably beaming everything to the cloud, right? Just an FYI, like Applications25 Mar 2025 | 18
VanHelsing ransomware emerges to put a stake through your Windows heart There's only one rule – don't attack Russia, duh Research25 Mar 2025 | 7
Paragon spyware deployed against journalists and activists, Citizen Lab claims Infosec newsbytes Plus: Customer info stolen from 'parental control' software slinger SpyX; F-35 kill switch denied Research21 Mar 2025 | 17
Too many software supply chain defense bibles? Boffins distill advice How to avoid another SolarWinds, Log4j, and XZ Utils situation Security20 Mar 2025 | 10
US tech jobs outlook clouded by DOGE cuts, Trump tariffs Hiring remains relatively strong as analysts warn of slowdown Research18 Mar 2025 | 57
Microsoft isn't fixing 8-year-old shortcut exploit abused for spying 'Only' a local access bug but important part of N Korea, Russia, and China attack picture Research18 Mar 2025 | 41
Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos Ad giant just confirmed its cloudy arm will embrace security shop in $30B deal Research18 Mar 2025 | 4
GitHub supply chain attack spills secrets from 23,000 projects Large organizations among those cleaning up the mess Cyber-crime17 Mar 2025 | 34
Google says it's rolling out fix for stricken Chromecasts It'll take a few days, give or take your situation Personal Tech13 Mar 2025 | 20
That 'angry guest' email from Booking.com? It's a scam, not a 1-star review Phishers check in, your credentials check out, Microsoft warns Research13 Mar 2025 | 9
DeepSeek can be gently persuaded to spit out malware code It might need polishing, but a useful find for any budding cybercrooks out there Research13 Mar 2025 | 12
MINJA sneak attack poisons AI models for other chatbot users Nothing like an OpenAI-powered agent leaking data or getting confused over what someone else whispered to it AI + ML11 Mar 2025 | 15
Google begs owners of crippled Chromecasts not to hit factory reset Updated Expired security cert kerfuffle leaves second-gen, Audio gadgets useless Personal Tech10 Mar 2025 | 63
Sidewinder goes nuclear, charts course for maritime mayhem in tactics shift Phishing and ancient vulns still do the trick for one of the most prolific groups around Research10 Mar 2025 | 8
We call this kernel saunters: How Apple rearranged its XNU core with exclaves iPhone giant compartmentalizes OS for the sake of security Research08 Mar 2025 | 17
The Badbox botnet is back, powered by up to a million backdoored Androids Best not to buy cheap hardware and use third-party app stores if you want to stay clear of this vast ad fraud effort Cyber-crime07 Mar 2025 | 10
China's Silk Typhoon, tied to US Treasury break-in, now hammers IT and govt targets Updated They're good at zero-day exploits, too Public Sector05 Mar 2025 | 17
Ransomware criminals love CISA's KEV list – and that's a bug, not a feature 1 in 3 entries are used to extort civilians, says new paper Ransomware in Focus28 Feb 2025 | 5
Does terrible code drive you mad? Wait until you see what it does to OpenAI's GPT-4o Updated Model was fine-tuned to write vulnerable software – then suggested enslaving humanity AI + ML27 Feb 2025 | 127
Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time Boffins poked around inside censorship engines – here's what they found Networks27 Feb 2025 | 38
MITRE Caldera security suite scores perfect 10 for insecurity Is a trivial remote-code execution hole in every version part of the training, or? Research25 Feb 2025 | 9
China's Silver Fox spoofs medical imaging apps to hijack patients' computers Sly like a PRC cyberattack Research25 Feb 2025 | 2
Malware variants that target operational tech systems are very rare – but 2 were found last year Fuxnet and FrostyGoop were both used in the Russia-Ukraine war Research25 Feb 2025 | 3
Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes Said bugs 'can have significant implications' – glad to hear that from Redmond AI + ML20 Feb 2025 | 7
Critical flaws in Mongoose library expose MongoDB to data thieves, code execution Bugs fixed, updating to the latest version is advisable Research20 Feb 2025 | 2
Check out this free automated tool that hunts for exposed AWS secrets in public repos You can find out if your GitHub codebase is leaking keys ... but so can miscreants Security19 Feb 2025 | 2
Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload Because stealing your credentials, banking info, and IP just wasn’t enough Research18 Feb 2025 | 8
XCSSET macOS malware returns with first new version since 2022 Known for popping zero-days of yesteryear, Microsoft puts Apple devs on high alert Research17 Feb 2025 | 6
Critical PostgreSQL bug tied to zero-day attack on US Treasury High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further Research14 Feb 2025 | 22
North Korea targets crypto developers via NPM supply chain attack Yet another cash grab from Kim's cronies and an intel update from Microsoft Research13 Feb 2025 | 8
Russia's Sandworm caught snarfing credentials, data from American and Brit orgs 'Near-global' initial access campaign active since 2021 Research12 Feb 2025 | 9
Canvassing apps used by UK political parties riddled with privacy, security issues Neither Labour, Conservatives, nor the Lib Dems offered a retort to rights org's report Research30 Jan 2025 | 21
SLAP, Apple, and FLOP: Safari, Chrome at risk of data theft on iPhone, Mac, iPad Silicon It's another cousin of Spectre, here to read your email, browsing history, and more Research29 Jan 2025 | 15
Security pros more confident about fending off ransomware, despite being battered by attacks Data leak, shmata leak. It will all work out, right? Cyber-crime28 Jan 2025 | 5
Hackers game out infowar against China with the US Navy Taipei invites infosec bods to come and play on its home turf Public Sector20 Jan 2025 | 5
Fortinet: FortiGate config leaks are genuine but misleading Competition hots up with Ivanti over who can have the worst start to a year Cyber-crime17 Jan 2025 | 5
Microsoft eggheads say AI can never be made secure – after testing Redmond's own products If you want a picture of the future, imagine your infosec team stamping on software forever AI + ML17 Jan 2025 | 85
Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used Updated Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg Networks14 Jan 2025 | 26
Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days 'Codefinger' crims on the hunt for compromised keys Research13 Jan 2025 | 5
Security pros baited with fake Windows LDAP exploit traps Tricky attackers trying yet again to deceive the good guys on home territory Cyber-crime09 Jan 2025 | 7
DNA sequencers found running ancient BIOS, posing risk to clinical research Updated Devices on six-year-old firmware vulnerable to takeover and destruction Research08 Jan 2025 | 24
Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed Here's what $20 gets you these days Research08 Jan 2025 | 13
FireScam infostealer poses as Telegram Premium app to surveil Android devices updated Once installed, it helps itself to your data like it's a free buffet Research06 Jan 2025 | 5
How cops taking down LockBit, ALPHV led to RansomHub's meteoric rise Cut off one head, two more grow back in its place Cyber-crime28 Dec 2024 | 4
How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware' Botnet's operators 'driven by similar interests as that of the Chinese state' Cyber-crime24 Dec 2024 | 3
UK ICO not happy with Google's plans to allow device fingerprinting Infosec in brief Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more Security23 Dec 2024 | 75
Boffins trick AI model into giving up its secrets All it took to make an Google Edge TPU give up model hyperparameters was specific hardware, a novel attack technique … and several days Research18 Dec 2024 | 20
Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks IOCONTROL targets IoT and OT devices from a ton of makers, apparently Research13 Dec 2024 | 14
AMD secure VM tech undone by DRAM meddling Boffins devise BadRAM attack to pilfer secrets from SEV-SNP encrypted memory Systems10 Dec 2024 | 10
Fully patched Cleo products under renewed 'zero-day-ish' mass attack Thousands of servers targeted while customers wait for patches Research10 Dec 2024 |
Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket Exclusive ShinyHunters-linked heist thought to have been ongoing since March Research09 Dec 2024 | 9
How Chinese insiders are stealing data scooped up by President Xi's national surveillance system Feature 'It's a double-edged sword,' security researchers tell The Reg Public Sector08 Dec 2024 | 52