15 Jul

Britain’s billion-pound F-35s not quite ready for, well, anything

The F-35 stealth fighter is not meeting its potential in British service because of availability issues, a shortage of support personnel, and delays in integrating

Author rabih
15 Jul

Unmasking AsyncRAT: Navigating the labyrinth of forks

AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of forks

Author rabih
14 Jul

Someone hijacked Elmo’s X account to post antisemitic rants

Someone hacked Elmo’s X account on Sunday, making it appear as if the lovable Sesame Street monster with the habit of referring to themselves in

Author rabih
14 Jul

Nvidia A6000 GPUs flip memory bits if beaten by GPUHammer

The Rowhammer attack on computer memory is back, and for the first time, it’s able to mess with bits in Nvidia GPUs, despite defenses designed

Author rabih
14 Jul

A software-defined radio can derail a US train by slamming the brakes on remotely

When independent security researcher Neil Smith reported a vulnerability in a comms standard used by trains to the US government in 2012, he most likely

Author rabih
14 Jul

GPS on the fritz? Britain and France plot a backup plan

Britain and France are to work more closely on technology to back up the familiar Global Positioning System (GPS), which is increasingly subject to interference

Author rabih
14 Jul

UK’s NCA disputes claim it’s nearly three times less efficient than the FBI

The UK’s National Crime Agency (NCA) has hit back at a think tank after it assessed its US counterpart, the FBI, to be nearly three

Author rabih
14 Jul

Iran seeks at least three cloud providers to power its government

The Information Technology Organization of Iran (ITOI), the government body that develops and implements IT services for the country, is looking for suppliers of cloud

Author rabih
13 Jul

Nvidia warns its GPUs – even Blackwells – need protection against Rowhammer attacks

Infosec In Brief Nvidia last week advised customers to ensure they employ mitigations against Rowhammer attacks, after researchers found one of its workstation-grade GPUs is

Author rabih
13 Jul

You have a fake North Korean IT worker problem – here’s how to stop it

By now, the North Korean fake IT worker problem is so ubiquitous that if you think you don’t have any phony resumes or imposters in

Author rabih
11 Jul

CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn

Huntress security researchers observed exploitation of the CVSS 10.0 remote code execution (RCE) flaw in Wing FTP Server on July 1, just one day after

Author rabih
11 Jul

CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn

Huntress security researchers observed exploitation of the CVSS 10.0 remote code execution (RCE) flaw in Wing FTP Server on July 1, just one day after

Author rabih
11 Jul

UK Online Safety Act ‘not up to scratch’ on misinformation, warn MPs

The Online Safety Act fails to tackle online misinformation, leaving the UK in need of further regulation to curb the viral spread of false content,

Author rabih
11 Jul

Security company hired a used car salesman to build a website, and it didn’t end well

On Call Welcome once again to On Call, The Register‘s Friday column that shares your stories of tech support terror and triumph. This week, meet

Author rabih
11 Jul

French cops cuff Russian pro basketball player on ransomware charges

A Russian professional basketball player is cooling his heels in a French detention center after being arrested and accused of acting as a negotiator for

Author rabih
11 Jul

Chinese censorship-busters claim Tencent is trying to kill its WeChat archive

Anti-censorship organization GreatFire.org has accused Singapore infosec outfit Group-IB of helping Chinese web giant Tencent to quell its activities. GreatFire researches China’s censorship efforts and

Author rabih
10 Jul

Lovestruck US Air Force worker admits leaking secrets on dating app

A lovestruck US Air Force employee has pleaded guilty to conspiring to transmit confidential national defense information after sharing military secrets information about the Russia-Ukraine

Author rabih
10 Jul

Now everybody but Citrix agrees that CitrixBleed 2 is under exploit

The US Cybersecurity and Infrastructure Security Agency has added its weighty name to the list of parties agreeing that CVE-2025-5777, dubbed CitrixBleed 2 by one

Author rabih
Load moreLoadingAll items loaded