UK asks cyberspies to probe whether Chinese buses can be switched off remotely Norwegian testers claim maker has remote access, while UK importer says supplier complies with the law Security11 Nov 2025 | 71
LLM side-channel attack could allow snoops to guess what you're talking about Updated Encryption protects content, not context Research11 Nov 2025 | 7
Previously unknown Landfall spyware used in 0-day attacks on Samsung phones 'Precision espionage campaign' began months before the flaw was fixed Research07 Nov 2025 | 8
MIT Sloan quietly shelves AI ransomware study after researcher calls BS Even AI has doubts about the claim that '80% of ransomware attacks are AI-driven' Research03 Nov 2025 | 18
Proton trains new service to expose corporate infosec cover-ups Service will tell on compromised organizations, even if they didn't plan on doing so themselves Security30 Oct 2025 |
Invisible npm malware pulls a disappearing act – then nicks your tokens PhantomRaven slipped over a hundred credential-stealing packages into npm Security30 Oct 2025 | 18
Researchers exploit OpenAI's Atlas by disguising prompts as URLs NeuralTrust shows how agentic browser can interpret bogus links as trusted user commands Research27 Oct 2025 | 3
How malware vaccines could stop ransomware's rampage Feature Security pros explore whether infection-spoofing code can immunize Windows systems against attack Security21 Oct 2025 | 24
Devs are writing VS Code extensions that blab secrets by the bucketload Vibe coding may have played a role in what took researchers months to fix Research15 Oct 2025 | 10
Pro-Russia hacktivist group dies of cringe after falling into researchers' trap Forescout's phony water plant fooled TwoNet into claiming a fake cyber victory – then it quietly shut up shop Security10 Oct 2025 | 10
Tile trackers are a stalker's dream, say Georgia Tech researchers Plaintext transmissions, fixed MAC addresses, rotating 'unique' IDs, and more, make abuse easy Research30 Sep 2025 | 15
Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign Not to be confused with all the other reports of Chinese intruders on US networks that came to light this week Research27 Sep 2025 | 14
Microsoft spots fresh XCSSET malware strain hiding in Apple dev projects Upgraded nasty slips into Xcode builds, steals crypto, and disables macOS defenses Security26 Sep 2025 | 2
Google warns China-linked spies lurking in 'numerous' enterprises Mandiant CTO anticipates 'hearing about this campaign for the next one to two years' Research24 Sep 2025 | 8
Nearly half of businesses suffered deepfaked phone calls against staff AI attacks on the rise Research23 Sep 2025 | 5
Kaspersky: RevengeHotels checks back in with AI-coded malware Old hotel scam gets an AI facelift, leaving travellers’ card details even more at risk Research23 Sep 2025 | 2
Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack Google and ETH Zurich found problems with AMD/SK Hynix combo, will probe other hardware Research17 Sep 2025 | 16
FileFix attacks use fake Facebook security alerts to trick victims into running infostealers Tech evolved from PoC to global campaign in under two months Security16 Sep 2025 | 6
HybridPetya: More proof that Secure Boot bypasses are not just an urban legend Although it hasn't been seen in the wild yet Research12 Sep 2025 | 23
AI-powered penetration tool, an attacker's dream, downloaded 10K times in 2 months Shady, China-based company, all the apps needed for a fully automated attack - sounds totally legit Research11 Sep 2025 |
Retail giant Kingfisher rejects SAP ERP upgrade plan 'Don't just give me a price list or licensing module that spikes cost by 20x, show me the value,' says CTO
UK asks cyberspies to probe whether Chinese buses can be switched off remotely Norwegian testers claim maker has remote access, while UK importer says supplier complies with the law
North Korean spies turn Google's Find Hub into remote-wipe weapon KONNI espionage crew covertly abused Google’s Find My Device feature to remotely factory-reset Android phones
UK's Ajax fighting vehicle arrives – years late and still sending crew to hospital Continuous track of long awaited AFV hits the ground ... and the terrain is pretty bumpy
Hitachi-owned GlobalLogic admits data stolen on 10k current and former staff Clop's Oracle EBS exploit spree shows no sign of slowing, claims nearly 30 more casualties in media, finance, and tech.
EU's reforms of GDPR, AI slated by privacy activists for 'playing into Big Tech’s hands' Lobbying efforts gain ground as proposals carve myriad holes into regulations
OWASP Top 10: Broken access control still tops app security list Risk list highlights misconfigs, supply chain failures, and singles out prompt injection in AI apps
Mozilla's Firefox 145 is heeeeeere: Buffs up privacy, bloats AI Updated Improves tracking prevention, profile management, PDF editing, and Perplexity creeps into your address bar
Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets AMD Zen hardware and Intel Coffee Lake affected Research11 Sep 2025 | 4
Apple slips up on ChillyHell macOS malware, lets it past security . . . for 4 years 'We do believe that this was likely the creation of a cybercrime group,' threat hunter tells The Reg Research10 Sep 2025 | 18
Internet mapping and research outfit Censys reveals state-based abuse, harassment ‘Universities are being used to proxy offensive government operations, turning research access decisions political’ Research03 Sep 2025 | 19
LegalPwn: Tricking LLMs by burying badness in lawyerly fine print Trust and believe – AI models trained to see 'legal' doc as super legit AI + ML01 Sep 2025 | 35
Researcher who found McDonald's free-food hack turns her attention to Chinese restaurant robots Updated The controls were left wide open on Pudu's robots Research29 Aug 2025 | 34
ChatGPT hates LA Chargers fans Harvard researchers find model guardrails tailor query responses to user's inferred politics and other affiliations AI + ML27 Aug 2025 | 15
Nx NPM packages poisoned in AI-assisted supply chain attack Stolen dev credentials posted to GitHub as attackers abuse CLI tools for recon Devops27 Aug 2025 | 2
Who are you again? Infosec experiencing 'Identity crisis' amid rising login attacks Vendor insists passkeys are the future, but getting workers on board is proving difficult Research27 Aug 2025 | 39
ZipLine attack uses 'Contact Us' forms, White House butler pic to invade sensitive industries 'Many dozens' targeted in ongoing campaign, CheckPoint researcher tells The Reg Cyber-crime26 Aug 2025 | 6
Google yet to take down 'screenshot-grabbing' Chrome VPN extension Updated Researcher claims extension didn't start out by exfiltrating info... while dev says its actions are 'compliant' Research21 Aug 2025 | 10
AI crawlers and fetchers are blowing up websites, with Meta and OpenAI the worst offenders Updated One fetcher bot seen smacking a website with 39,000 requests per minute AI + ML21 Aug 2025 | 83
Facial recognition works better in the lab than on the street, researchers show High accuracy scores come from conditions that don't reflect real-world usage Research18 Aug 2025 | 31
Boffins say tool can sniff 5G traffic, launch 'attacks' without using rogue base stations UPdated Sni5Gect research crew targets sweet spot during device / network handshake pause Research18 Aug 2025 | 13
'MadeYouReset' HTTP/2 flaw lets attackers DoS servers Researchers had to notify over 100 vendors of flaw that builds on 2023's Rapid Reset with neat twist past usual mitigations Research14 Aug 2025 | 7
Poisoned telemetry can turn AIOps into AI Oops, researchers show Sysadmins, your job is safe Networks12 Aug 2025 | 6
Chinese biz using AI to hit US politicians, influencers with propaganda DEF CON In misinformation, Russia might be the top dog but the Chinese are coming warns former NSA boss Research08 Aug 2025 | 17
Infosec hounds spot prompt injection vuln in Google Gemini apps Black hat Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed Research08 Aug 2025 | 4
German security researchers say 'Windows Hell No' to Microsoft biometrics for biz Black Hat Hello loophole could let a rogue admin, or a pwned one, inject new facial scans Research07 Aug 2025 | 31
Patch now: Millions of Dell PCs with Broadcom chips vulnerable to attack black hat Psst, wanna steal someone's biometrics? Patches05 Aug 2025 | 20
Study finds humans not completely useless at malware detection Some pinpointed software nasties but were suspicious of printer drivers too Security05 Aug 2025 | 11
Cybercrooks attached Raspberry Pi to bank network and drained ATM cash Criminals used undocumented techniques and well-placed insiders to remotely withdraw money Research01 Aug 2025 | 26
Kremlin goons caught abusing ISPs to spy on Moscow-based diplomats, Microsoft says Russia spying on foreign embassies? Say it ain't so Security31 Jul 2025 | 61
Silk Typhoon spun a web of patents for offensive cyber tools, report says US court docs reveal that infamous Chinese snoops filed IP papers like tax returns Research31 Jul 2025 | 3
FBI: Watch out for these signs Scattered Spider is spinning its web around your org New malware, even better social engineering chops Cyber-crime29 Jul 2025 | 11
Security pros are drowning in threat-intel data and it's making everything more dangerous Plus, 60% don't have enough analysts to make sense of it CSO28 Jul 2025 | 17
Freelance dev shop Toptal caught serving malware after GitHub account break-in updated Malicious code lurking in over 5,000 downloads, says Socket researcher Cyber-crime25 Jul 2025 | 2
Coyote malware abuses Microsoft's UI Automation to hunt banking creds Some coyotes hunt squirrels, this one hunts users' financial apps Research24 Jul 2025 | 1
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog Computer scientist Peter Gutmann tells The Reg why it's 'bollocks' Research17 Jul 2025 | 97
Crims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkit Updated Someone's OVERSTEPing the mark Research16 Jul 2025 | 3
Nvidia A6000 GPUs flip memory bits if beaten by GPUHammer Rowhammer returns for more memory-meddling fun Research14 Jul 2025 | 4
How to trick ChatGPT into revealing Windows keys? I give up No, really, those are the magic words Research09 Jul 2025 | 101
Massive browser hijacking campaign infects 2.3M Chrome, Edge users updated These extensions weren't malware-laced from the start, researcher says Research08 Jul 2025 | 39
Phishing platforms, infostealers blamed as identity attacks soar Get your creds in order or risk BEC, ransomware attacks, orgs warned CSO07 Jul 2025 |
ChatGPT creates phisher’s paradise by recommending the wrong URLs for major companies Crims have cottoned on to a new way to lead you astray Research03 Jul 2025 | 24
Cl0p cybercrime gang's data exfiltration tool found vulnerable to RCE attacks Experts say they don't expect the MOVEit menace to do much about it Research02 Jul 2025 | 3
Computer vision research feeds surveillance tech as patent links spike 5× A bottomless appetite for tracking people as 'objects' Research25 Jun 2025 | 3
Boffins devise voice-altering tech to jam 'vishing' schemes To stop AI scam callers, break automatic speech recognition systems Research19 Jun 2025 | 42
Do you trust Xi with your 'private' browsing data? Apple, Google stores still offer China-based VPNs, report says Some trace back to an outfit under US export controls for alleged PLA links Research13 Jun 2025 | 33
Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks The 16 other flagged issues are on customers, says CRM giant Research11 Jun 2025 |
Critical Wazuh bug exploited in growing Mirai botnet infection The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too Research10 Jun 2025 |
Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more Research10 Jun 2025 | 59
Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs SentinelOne discovered the campaign when they tried to hit the security vendor's own servers Research09 Jun 2025 | 17
ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist OpenAI boots accounts linked to 10 malicious campaigns Research06 Jun 2025 | 23
More than a hundred backdoored malware repos traced to single GitHub user Someone went to great lengths to prey on the next generation of cybercrooks Cyber-crime05 Jun 2025 | 12
AI kept 15-year-old zombie vuln alive, but its time is drawing near Researchers have come up with a fix for a path traversal bug first spotted in 2010 Research05 Jun 2025 | 27
Meta pauses mobile port tracking tech on Android after researchers cry foul Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins Research03 Jun 2025 | 53
8,000+ Asus routers popped in 'advanced' mystery botnet plot No formal attribution made but two separate probes hint at the same suspect Research29 May 2025 | 10
Ivanti makes dedicated fans of Chinese spies who just can't resist attacking its buggy kit If it ain't broke? Datacenter Networking Nexus23 May 2025 | 1
'Ongoing' Ivanti hijack bug exploitation reaches clouds Nothing like insecure code in security suites CSO21 May 2025 | 4
Intel's data-leaking Spectre defenses scared off yet again Updated ETH Zurich boffins exploit branch prediction race condition to steal info from memory, fixes have mild perf hit Research13 May 2025 | 5
You think ransomware is bad now? Wait until it infects CPUs RSAC Rapid7 threat hunter wrote a PoC. No, he's not releasing it Research11 May 2025 | 64
Ghost in the shell script: Boffins reckon they can catch bugs before programs run Go ahead, please do Bash static analysis CSO30 Apr 2025 | 39
Enterprise tech dominates zero-day exploits with no signs of slowdown As Big Tech gets used to the pain, smaller vendors urged to up their game Research29 Apr 2025 | 1
Darcula adds AI to its DIY phishing kits to help would-be vampires bleed victims dry Because coding phishing sites from scratch is a real pain in the neck Cyber-crime25 Apr 2025 | 5
Booby-trapped Alpine Quest Android app geolocates Russian soldiers Back of the nyet! Research24 Apr 2025 | 37
Who needs phishing when your login's already in the wild? Stolen credentials edge out email tricks for cloud break-ins because they're so easy to get CSO23 Apr 2025 | 11
A pot of $250K is now available to ransomware researchers, but it feeds a commercial product Security bods can earn up to $10K per report Research22 Apr 2025 | 3
Today's LLMs craft exploits from patches at lightning speed Erlang? Er, man, no problem. ChatGPT, Claude to go from flaw disclosure to actual attack code in hours AI Software Development Week21 Apr 2025 | 19
Hacking US crosswalks to talk like Zuck is as easy as 1234 Video AI-spoofed Mark joins fellow billionaires as the voice of the street – here's how it was probably done Bootnotes19 Apr 2025 | 88
Uncle Sam kills funding for CVE program. Yes, that CVE program Updated Because vulnerability management has nothing to do with national security, right? CSO16 Apr 2025 | 178
Chinese snoops use stealth RAT to backdoor US orgs – still active last week Let the espionage and access resale campaigns begin (again) Research15 Apr 2025 | 3
Scattered Spider stops the Rickrolls, starts the RAT race Despite arrests, eight-legged menace targeted more victims this year Research08 Apr 2025 | 5
As CISA braces for more cuts, threat intel sharing takes a hit Analysis How will 'gutting' civilian defense agency make American cybersecurity great again? Public Sector08 Apr 2025 | 11
For flux sake: CISA, annexable allies warn of hot DNS threat Shape shifting technique described as menace to national security CSO03 Apr 2025 | 5
Top cybersecurity boffin, wife vanish as FBI raids homes Updated Indiana Uni rm -rf online profiles while agents haul boxes of evidence Research31 Mar 2025 | 21
Malware in Lisp? Now you're just being cruel Miscreants warming to Delphi, Haskell, and the like to evade detection Research29 Mar 2025 | 56
You know that generative AI browser assistant extension is probably beaming everything to the cloud, right? Just an FYI, like Applications25 Mar 2025 | 18
VanHelsing ransomware emerges to put a stake through your Windows heart There's only one rule – don't attack Russia, duh Research25 Mar 2025 | 7
Paragon spyware deployed against journalists and activists, Citizen Lab claims Infosec newsbytes Plus: Customer info stolen from 'parental control' software slinger SpyX; F-35 kill switch denied Research21 Mar 2025 | 17
Too many software supply chain defense bibles? Boffins distill advice How to avoid another SolarWinds, Log4j, and XZ Utils situation Security20 Mar 2025 | 10
US tech jobs outlook clouded by DOGE cuts, Trump tariffs Hiring remains relatively strong as analysts warn of slowdown Research18 Mar 2025 | 57
Microsoft isn't fixing 8-year-old shortcut exploit abused for spying 'Only' a local access bug but important part of N Korea, Russia, and China attack picture Research18 Mar 2025 | 41
Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos Ad giant just confirmed its cloudy arm will embrace security shop in $30B deal Research18 Mar 2025 | 4
GitHub supply chain attack spills secrets from 23,000 projects Large organizations among those cleaning up the mess Cyber-crime17 Mar 2025 | 34
Google says it's rolling out fix for stricken Chromecasts It'll take a few days, give or take your situation Personal Tech13 Mar 2025 | 20
That 'angry guest' email from Booking.com? It's a scam, not a 1-star review Phishers check in, your credentials check out, Microsoft warns Research13 Mar 2025 | 9
DeepSeek can be gently persuaded to spit out malware code It might need polishing, but a useful find for any budding cybercrooks out there Research13 Mar 2025 | 12
MINJA sneak attack poisons AI models for other chatbot users Nothing like an OpenAI-powered agent leaking data or getting confused over what someone else whispered to it AI + ML11 Mar 2025 | 15
Google begs owners of crippled Chromecasts not to hit factory reset Updated Expired security cert kerfuffle leaves second-gen, Audio gadgets useless Personal Tech10 Mar 2025 | 63