News
Telnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
infosec in brief The cybercrime crew linked to the Trivy supply-chain attack has struck again, this time pushing malicious Telnyx package versions to PyPI in an effort to plant credential-stealing malware on developers’ systems.…
Citrix NetScaler bug exploited in days, may be multiple flaws in a trench coat
In-the-wild exploitation of a critical Citrix NetScaler bug has begun less than a week after disclosure, with researchers warning that attackers are already poking and pillaging vulnerable boxes.…
European Commission admits attackers broke into public web systems, but says little else
The European Commission has admitted that attackers broke into its public-facing web infrastructure and siphoned off data in a bare-bones disclosure that answers the what but ducks most of the how.…
Security contractor blew the whistle on support crew's viral indifference
Who, Me? The week before Easter may be a short one for many in the Reg-reading world, but that won't stop us from opening it with a fresh installment of Who, Me? It's the reader-contributed column in which you share stories of things you did at work that had interesting consequences.…
US foreign router ban criticized for being ‘industrial policy disguised as cybersecurity’
The United States’ ban on foreign-made SOHO routers won’t improve security, and only makes sense as “industrial policy disguised as cybersecurity,” according to Milton Mueller, Professor at the University of Georgia’s School of Public Policy and founder of its Internet Governance Project.…
AFC Ajax drops ball as flaws let hackers play admin with tickets and bans
Dutch football giant AFC Ajax has admitted to a data breach after an attacker gained access to its internal systems, in an incident that looks less like a stray pass and more like the gates left wide open.…
Iran war drives urgent need to counter underwater attack drones
The UK and US are looking for technology to counter the threat posed by underwater drones to ships, harbors and other critical maritime infrastructure, and are asking industry for answers.…
Security boffins scoured the web and found hundreds of valid API keys
Computer security boffins have conducted an analysis of 10 million websites and found almost 2,000 API credentials strewn across 10,000 webpages.…
Brit lawmaker targeted by AI deepfake fails to get answers from US Big Tech
A member of the UK Parliament's lower house who was the victim of a deepfake AI campaign this week had a rare chance to confront the Big Tech executives who helped spread it. Their answers disappointed.…
UK wants to know if banning under-16s from social media does anything useful
The UK government will trial different levels of restrictions on social media for under-16s with the help of 300 families, alongside a public consultation that has already gathered nearly 30,000 responses.…
Indian government probes CCTV espionage operation linked to Pakistan
Indian authorities have reportedly ordered an audit of the nation’s CCTV cameras, after police uncovered what they claim was a Pakistan-backed surveillance operation.…
AI supply chain attacks don’t even require malware…just post poisoned documentation
A new service that helps coding agents stay up to date on their API calls could be dialing in a massive supply chain vulnerability.…
Scammers have virtual smartphones on speed dial for fraud
Smartphones have fast become the basis of our digital identities, securing payment systems and bank accounts. Now virtual devices that pretend to be real handsets have become a key tool for financial scammers, according to one company. …
Jen Easterly, cybersecurity's 'relentless optimist,' hopes feds come back to RSAC next year
RSAC 2026 "Everybody feels massive FOMO if they don't get to RSAC," Jen Easterly says.…
Only Trump can decide when cyberwar turns into real war
rsac 2026 There's a theoretical red line with cyber warfare. Cross it, and the US will respond with a physical attack like missile strikes. And that line "is whatever the President says it is," according to former NSA boss retired General Paul Nakasone.…
Enterprise PCs are unreliable, unpatched, and unloved compared to Macs
End-user compute vendor Omnissa, the company formed by the spin-out of VMware’s virtual desktops, applications, and device management biz, has dug into the telemetry it collects from customers and painted a picture of the world’s enterprise hardware fleet – and the news is better for Google and Apple than it is for Microsoft.…
EFF has a new boss to lead the fight against privacy-sucking forces of doom
interview The Electronic Frontier Foundation (EFF) on Tuesday appointed Nicole Ozer to succeed Cindy Cohn as the cyber rights group's executive director when Cohn departs this summer.…
1K+ cloud environments infected following Trivy supply chain attack
RSAC 2026 Thousands of organizations' cloud environments have been infected with secret-stealing malware as a result of the Trivy supply-chain attack last week, and now the crims that compromised the open source scanners are working with notorious extortion crews like Lapsus$.…
LiteLLM loses game of Trivy pursuit, gets compromised
Two versions of LiteLLM, an open source interface for accessing multiple large language models, have been removed from the Python Package Index (PyPI) following a supply chain attack that injected them with malicious credential-stealing code.…
HackerOne slams supplier for delayed breach notice after staff data exposed
Almost 300 HackerOne employees are caught up in a data breach, with the bug bounty biz slamming a third-party benefits provider for a weeks-long delay in notification.…