03 Sep

Crims claim HexStrike AI penetration tool makes quick work of Citrix bugs

Attackers on underground forums claimed they were using HexStrike AI, an open-source red-teaming tool, against Citrix NetScaler vulnerabilities within hours of disclosure, according to Check

Author rabih
03 Sep

It looks like you’re ransoming data. Would you like some help?

It’s no secret that AI tools make it easier for cybercriminals to steal sensitive data and then extort victim organizations. But two recent developments illustrate

Author rabih
03 Sep

Matrix.org homeserver grinds to a halt after RAID meltdown

A RAID failure has taken the Matrix.org homeserver offline, leaving users of the decentralized messaging service unable to send or receive messages while engineers attempt

Author rabih
03 Sep

Internet mapping and research outfit Censys reveals state-based abuse, harassment

Censys Inc, vendor of the popular Censys internet-mapping tool, has revealed that state-based actors are trying to abuse its services by hiding behind academic researchers.

Author rabih
02 Sep

How big will this Drift get? Cloudflare cops to Salesloft Drift breach

The list of victims keeps growing, as yet another company — Cloudflare — today disclosed that some of its customers’ data was also compromised in the

Author rabih
02 Sep

Who watches the watchmen? Surveillanceware firms make bank, avoid oversight

Governments can’t get enough of hacking services to use against their citizens, despite their protestations that elements of the trade need sanctioning. Only legitimate government

Author rabih
02 Sep

Zscaler latest victim of Salesloft Drift attacks, customer data exposed

Zscaler is the latest company to disclose some of its customers’ data was exposed in the recent spate of Salesloft Drift attacks affecting Salesforce databases.

Author rabih
02 Sep

Stolen OAuth tokens expose Palo Alto customer data

Palo Alto Networks is writing to customers that may have had commercially sensitive data exposed after criminals used stolen OAuth credentials lifted from the Salesloft

Author rabih
02 Sep

Huawei counts cost of Western bans as UK business withers

Huawei’s business in Britain has dwindled in the half-decade since the UK acquiesced to demands from the US to ban the Chinese networking giant from

Author rabih
02 Sep

Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk

Ten vulnerabilities in Copeland controllers, which are found in thousands of devices used by the world’s largest supermarket chains and cold storage companies, could have

Author rabih
02 Sep

Reg readers have spoken: 93% back move away from Microsoft in UK public sector

Register debate series Register readers are backing a shift away from Microsoft software as a default across the UK public sector after the government confirmed

Author rabih
02 Sep

Europe Putin the blame on Russia after GPS jamming disrupts president’s plane

A plane carrying European Commission (EC) president Ursula von der Leyen to Bulgaria was forced to resort to manual navigation techniques after GPS jamming that

Author rabih
02 Sep

In the rush to adopt hot new tech, security is often forgotten. AI is no exception

Cisco’s Talos security research team has found over 1,100 Ollama servers exposed to the public internet, where miscreants can use them to do nasty things.

Author rabih
01 Sep

Norway’s £10B UK frigate deal could delay Royal Navy ships

Norway has ordered British-made Type 26 frigates in a contract valued at roughly £10 billion to the UK economy, but this may delay the introduction

Author rabih
01 Sep

DDoS is the neglected cybercrime that’s getting bigger. Let’s kill it off

Opinion Agatha Christie stuck a dagger in the notion that crime doesn’t pay. With sales of between two and four billion books – fittingly, the

Author rabih
01 Sep

LegalPwn: Tricking LLMs by burying badness in lawyerly fine print

Researchers at security firm Pangea have discovered yet another way to trivially trick large language models (LLMs) into ignoring their guardrails. Stick your adversarial instructions

Author rabih
01 Sep

Traffic to government domains often crosses national borders, or flows through risky bottlenecks

Internet traffic to government domains often flows across borders, relies on a worryingly small number of network connections, or does not require encryption, according to

Author rabih
01 Sep

WhatsApp warns of ‘attack against specific targeted users’

Infosec In brief A flaw in Meta’s WhatsApp app “may have been exploited in a sophisticated attack against specific targeted users.” Meta made that alarming

Author rabih
Load moreLoadingAll items loaded