10 Jul

Ransomware crews investing in custom data stealing malware

As ransomware crews increasingly shift beyond just encrypting victims’ files and demanding a payment to unlock them, instead swiping sensitive info straight away, some of

Author rabih
10 Jul

Understanding IoT security risks and how to mitigate them | Cybersecurity podcast

Video, Internet of Things As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and

Author rabih
10 Jul

Big Tech’s eventual response to my LLM-crasher bug report was dire

Column Found a bug? It turns out that reporting it with a story in The Register works remarkably well … mostly. After publication of my

Author rabih
10 Jul

ViperSoftX variant spotted abusing .NET runtime to disguise data theft

A rapidly-changing infostealer malware known as ViperSoftX has evolved to become more dangerous, according to security researchers at threat detection vendor Trellix. ViperSoftX, first spotted

Author rabih
10 Jul

RADIUS networking protocol blasted into submission through MD5-based flaw

Cybersecurity experts at universities and Big Tech have disclosed a vulnerability in a common client-server networking protocol that allows snoops to potentially bypass user authentication

Author rabih
10 Jul

Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday

Patch Tuesday Clear your Microsoft system administrator’s diary: The bundle of fixes in Redmond’s July Patch Tuesday is a doozy, with at least two bugs

Author rabih
09 Jul

FBI, cyber-cops zap ~1K Russian AI disinfo Twitter bots

The FBI and cybersecurity agencies in Canada and the Netherlands say they have taken down an almost 1,000-strong Twitter bot farm set up by Russian

Author rabih
09 Jul

Elexon’s Insight into UK electricity felled by expired certificate

Certificate Watch Demonstrating that Microsoft is not alone in its inability to keep track of certificates is UK power market biz Elexon. Elexon is an

Author rabih
09 Jul

Evolve Bank & Trust confirms LockBit stole 7.6 million people’s data

Evolve Bank & Trust says the data of more than 7.6 million customers was stolen during the LockBit break-in in late May, per a fresh

Author rabih
09 Jul

Houthi rebels are operating their own GuardZoo spyware

Interview When it comes to surveillance malware, sophisticated spyware with complex capabilities tends to hog the limelight – for example NSO Group’s Pegasus, which is

Author rabih
09 Jul

5 common Ticketmaster scams: How fraudsters steal the show

Scams Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop

Author rabih
09 Jul

Microsoft China staff can’t log on with an Android, so Redmond buys them iThings

Microsoft China will provide staff with Apple devices so they can log on to the software giant’s systems. The Register confirmed this odd state of

Author rabih
09 Jul

Scammers double-scam victims by offering to help recover from scams

Australia’s Competition and Consumer Commission has warned that scammers are targeting scam victims with fake offers to help them recover from scams. The Commission (ACCC)

Author rabih
09 Jul

China’s APT40 gang is ready to attack vulns within hours or days of public release.

Law enforcement agencies from eight nations, led by Australia, have issued an advisory that details the tradecraft used by China-aligned threat actor APT40 – aka

Author rabih
08 Jul

Microsoft forgets about SwiftKey’s support site

Another Microsoft certificate has expired, leaving SwiftKey users that are seeking support faced with an alarming certificate error. SwiftKey is a predictive keyboard for Android,

Author rabih
08 Jul

Avast secretly gave DoNex ransomware decryptors to victims before crims vanished

Researchers at Avast have provided decryptors to DoNex ransomware victims on the down-low since March after discovering a flaw in the crims’ cryptography, the company

Author rabih
08 Jul

Navigating Europe’s digital identity crossroads

Partner Content : Opening a bank account, making or receiving a payment, instructing an accountant or booking a doctor’s appointment. These everyday tasks depend on

Author rabih
08 Jul

Selfie-based authentication raises eyebrows among infosec experts

The use of selfies to verify identity online is an emerging trend in some parts of the world since the pandemic forced more business to

Author rabih
Load moreLoadingAll items loaded