09 Jan

QR codes a powerful new phishing weapon in hands of Pyongyang cyberspies

North Korean government hackers are turning QR codes into credential-stealing weapons, the FBI has warned, as Pyongyang’s spies find new ways to duck enterprise security

Author rabih
09 Jan

China-linked cybercrims abused VMware ESXi zero-days a year before disclosure

Chinese-linked cybercriminals were sitting on a working VMware ESXi hypervisor escape kit more than a year before the bugs it relied on were made public.

Author rabih
09 Jan

Grok told to cover up as UK weighs action over AI ‘undressing’

Grok has yanked its image-generation toy out of the hands of most X users after the UK government openly weighed a ban over the AI

Author rabih
09 Jan

Help desk read irrelevant script, so techies found and fixed their own problem

On Call 2025 has ended and a new year is upon us, but The Register will continue opening Friday mornings with a fresh installment of

Author rabih
08 Jan

As agents run amok, CrowdStrike’s $740M SGNL deal aims to help get a grip on identity security

CrowdStrike has signed a $740 million deal to buy identity security startup SGNL. The move underscores the growing threat of identity-based attacks as companies struggle

Author rabih
08 Jan

Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit

Cisco patched a bug in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products that allows remote attackers with admin-level privileges to

Author rabih
08 Jan

Yes, criminals are using AI to vibe-code malware

Interview With everyone from would-be developers to six-year-old kids jumping on the vibe coding bandwagon, it shouldn’t be surprising that criminals like automated coding tools

Author rabih
08 Jan

Ransomware attacks kept climbing in 2025 as gangs refused to stay dead

If 2025 was meant to be the year ransomware started dying, nobody appears to have told the attackers. In its 2025 State of Ransomware in

Author rabih
08 Jan

CISA flags actively exploited Office relic alongside fresh HPE flaw

CISA has added a pair of security holes to its actively exploited list, warning that attackers are now abusing a maximum-severity bug in HPE’s OneView

Author rabih
08 Jan

UK regulators swarm X after Grok generated nudes from photos

Elon Musk’s X platform is under fire as UK regulators close in on mounting reports that the platform’s AI chatbot, Grok, is generating sexual imagery

Author rabih
08 Jan

Maximum-severity n8n flaw lets randos run your automation server

A maximum-severity bug in the popular automation platform n8n has left an estimated 100,000 servers wide open to complete takeover, courtesy of a flaw so

Author rabih
08 Jan

OpenAI putting bandaids on bandaids as prompt injection problems keep festering

Security researchers at Radware say they’ve identified several vulnerabilities in OpenAI’s ChatGPT service that allow the exfiltration of personal information. The flaws, identified in a

Author rabih
08 Jan

Are criminals vibe coding malware? All signs point to yes

Interview With everyone from would-be developers to six-year-old kids jumping on the vibe coding bandwagon, it shouldn’t be surprising that criminals like automated coding tools

Author rabih
08 Jan

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08

Author rabih
08 Jan

Logitech macOS mouse mayhem traced to expired dev certificate

Logitech says an expired developer certificate is to blame after swaths of customers were left infuriated when their mice malfunctioned. Various users took to social

Author rabih
08 Jan

Cloudflare pours cold water on ‘BGP weirdness preceded US attack on Venezuela’ theory

Cloudflare has poured cold water on a theory that the USA’s incursion into Venezuela coincided with a cyberattack on telecoms infrastructure. The theory came from

Author rabih
07 Jan

IBM’s AI agent Bob easily duped to run malware, researchers show

IBM describes its coding agent thus: “Bob is your AI software development partner that understands your intent, repo, and security standards.” Unfortunately, Bob doesn’t always

Author rabih
07 Jan

ESA calls cops as crims lift off 500 GB of files, say security black hole still open

exclusive The European Space Agency on Wednesday confirmed yet another massive security breach, and told The Register that the data thieves responsible will be subject

Author rabih
Load moreLoadingAll items loaded