The Register
Cyber weapons in the Israel-Iran conflict may hit the US
The current Israel–Iran military conflict is taking place in the era of hybrid war, where cyberattacks amplify and assist missiles and troops, and is being waged between two countries with very capable destructive cyber weapons.…
Do you trust Xi with your 'private' browsing data? Apple, Google stores still offer China-based VPNs, report says
Both Apple's and Google's online stores offer free virtual private network (VPN) apps owned by Chinese companies, according to researchers at the Tech Transparency Project, and they don't make this fact readily known to people downloading the apps.…
Apple fixes zero-click exploit underpinning Paragon spyware attacks
Apple has updated its iOS/iPadOS 18.3.1 documentation, confirming it introduced fixes for the zero-click vulnerability used to infect journalists with Paragon's Graphite spyware.…
Wanted: Junior cybersecurity staff with 10 years' experience and a PhD
Cybersecurity hiring managers need a reality check when it comes to hiring junior staff, with job adverts littered with unfair expectations that are hampering recruitment efforts, says industry training and cert issuer ISC2.…
Slapped wrists for Financial Conduct Authority staff who emailed work data home
Four staffers at the UK's Financial Conduct Authority (FCA) were let off with warnings over separate cases involving the transmission of regulator data to their personal email accounts.…
Ransomware scum disrupted utility services with SimpleHelp attacks
Ransomware criminals infected a utility billing software providers' customers, and in some cases disrupted services, after exploiting unpatched versions of SimpleHelp’s remote monitoring and management (RMM) tool, according to a Thursday CISA alert.…
'Major compromise' at NHS temping arm exposed gaping security holes
Exclusive Cybercriminals broke into systems belonging to the UK's NHS Professionals body in May 2024, stealing its Active Directory database, but the healthcare organization never publicly disclosed it, The Register can reveal.…
DeepSeek installer or just malware in disguise? Click around and find out
Suspected cybercriminals have created a fake installer for Chinese AI model DeepSeek-R1 and loaded it with previously unknown malware called "BrowserVenom".…
Hire me! To drop malware on your computer
In a scam that flips the script on fake IT worker schemes, cybercriminals posing as job seekers on LinkedIn and Indeed are targeting recruiters - a group hated only slightly less than digital crooks - with malware hosted on phony resume portfolio sites.…
Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks
Salesforce has assigned five CVE identifiers following a security report that uncovered more than 20 configuration weaknesses, some of which exposed customers to unauthorized access and session hijacking.…
Asia dismantles 20,000 malicious domains in infostealer crackdown
Thirty-two people across Asia have been arrested over their suspected involvement with infostealer malware in the latest international collaboration against global cybercrime.…
Analysis to action: Operationalizing your threat intelligence
Partner content When a new security advisory drops or an alarming new ransomware campaign makes the news, the question from leadership inevitably follows: "Are we covered?"…
Microsoft slows Windows 11 24H2 Patch Tuesday due to a 'compatibility issue'
Microsoft has set a new record with June's security update for the time between release and an admission of borkage.…
CISO who helped unmask Badbox warns: Version 3 is coming
Badbox 2.0, the botnet that infected millions of smart TV boxes and connected devices before private security researchers and law enforcement partially disrupted its infrastructure, is readying for a third round of fraud and digital attacks, according to one of the threat hunters who uncovered the original scheme.…
Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack
Patch Tuesday It's Patch Tuesday time again, and Microsoft is warning that there are a bunch of critical fixes to sort out - and two actively exploited bugs.…
Texas warns 300,000 crash reports siphoned via compromised user account
The Texas Department of Transportation says a compromised user account was used to improperly download nearly 300,000 crash reports, exposing personal data that could be exploited for financial fraud against Lone Star drivers.…
Critical Wazuh bug exploited in growing Mirai botnet infection
Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code execution bug was disclosed.…
Winning the war on ransomware with AI: Four real-world use cases
Partner Content Cybercriminals are evolving, and so are the tools to stop them. As AI becomes more accessible, attackers are sharpening their tactics. But here's the good news: defenders are, too. AI is no longer a buzzword; it's a frontline weapon in the fight against ransomware.…
Trump guts digital ID rules, claims they help 'illegal aliens' commit fraud
President Donald Trump late Friday signed a cybersecurity-focused executive order that, in the White House's words, "amends problematic elements of Obama and Biden-era Executive Orders."…
Cloud brute-force attack cracks Google users' phone numbers in minutes
A researcher has exposed a flaw in Google's authentication systems, opening it to a brute-force attack that left users' mobile numbers up for grabs.…