China’s Spamouflage cranks up trolling of US Senator Rubio as election day looms
China’s Spamouflage disinformation crew has been targeting US Senator Marco Rubio (R-Florida) with its fake news campaigns over the past couple of months, trolling the
China’s Spamouflage disinformation crew has been targeting US Senator Marco Rubio (R-Florida) with its fake news campaigns over the past couple of months, trolling the
British security biz Sophos has announced a plan to gobble up competitor Secureworks in an $859 million deal that will make Dell happy. The server
Interview This month, presidential hopeful Donald Trump got a tool in his arsenal, some allegedly “unhackable” communications kit, and The Register has talked to the
In revealing details about a vulnerability that threatens the privacy of Apple fans, Microsoft urges all macOS users to update their systems. The bug, tracked
Tesla has denied it was involved in illegal-map making activities in China after Beijing asserted an unnamed foreign firm working on a smart car project
Despite the Internet Archive’s assurances it’s back on its feet after a recent infosec incident, the org still appears to be in trouble after parties
Researchers with Seattle-based Protect AI plan to release a free, open source tool that can find zero-day vulnerabilities in Python codebases with the help of
in brief A critical security update for the near-ubiquitous WordPress plugin Jetpack was released last week. Site administrators should ensure the latest version is installed
An Alabama man faces five years in prison for allegedly attempting to manipulate the price of Bitcoin by pwning the US Securities and Exchange Commission’s
Intel has responded to Chinese claims that its chips include security backdoors at the direction of America’s NSA. The accusations were made earlier this week
Video The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019
ESET denies being compromised after an infosec researcher highlighted a wiper campaign that appeared to victims as if it was launched using the Slovak security
A critical bug in Kubernetes Image Builder could allow unauthorized SSH access to virtual machines (VMs) thanks to default credentials being included during the image
Intel has responded to Chinese claims that its chips include security backdoors at the direction of America’s NSA. The accusations were made earlier this week
Intel has roundly rebutted Chinese accusations that its chips include security backdoors at the direction of the US National Security Agency (NSA). The accusations were
It’s a pattern cropping up more and more frequently: a company fills an IT contractor post, not realizing it’s mistakenly hired a North Korean operative.
The US has placed a $10 million bounty on Russian media network Rybar and a number of its key staffers following alleged attempts to sway
US insurance provider Globe Life, already grappling with legal troubles, now faces a fresh headache: an extortion attempt involving stolen customer data. In a report