The Register
Google: How to make any AMD Zen CPU always generate 4 as a random number
Googlers have not only figured out how to break AMD's security – allowing them to load unofficial microcode into its processors to modify the silicon's behavior as they wish – but also demonstrated this by producing a microcode patch that makes the chips always output 4 when asked for a random number.…
Poisoned Go programming language package lay undetected for 3 years
A security researcher says a backdoor masquerading as a legitimate Go programming language package used by thousands of organizations was left undetected for years.…
Grubhub serves up security incident with a side of needing to change your password
US food and grocery delivery platform Grubhub says a security incident at a third-party service provider is to blame after user data was compromised.…
US accuses Canadian math prodigy of $65M crypto scheme
New York feds today unsealed a five-count criminal indictment charging a 22-year-old Canadian math prodigy with exploiting vulnerabilities in two decentralized finance protocols, allegedly using them to fraudulently siphon around $65 million from investors in the platforms.…
Cyberattack on NHS causes hospitals to miss cancer care targets
NHS execs admit that last year's cyberattack on hospitals in Wirral, northwest England, continues to "significantly" impact waiting times for cancer treatments, and suspect this will last for "months."…
Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia's "SolarWinds adventures look amateurish and insignificant," watchTowr Labs security researchers have claimed.…
UK govt must learn fast and let failing projects die young
The UK's government spending watchdog has called on the current administration to make better use of technology to kickstart the misfiring economy and ensure better delivery public services amid tightened budgets.…
Google patches odd Android kernel security bug amid signs of targeted exploitation
Google has released its February Android security updates, including a fix for a high-severity kernel-level vulnerability, which is suspected to be in use by targeted exploits.…
Why digital resilience is critical to banks
Partner Content In today's highly connected and technology-driven world, digital resilience is not just a competitive advantage for banks - it is a necessity.…
TSA’s airport facial-recog tech faces audit probe
The Department of Homeland Security's Inspector General has launched an audit of the Transportation Security Administration's use of facial recognition technology at US airports, following criticism from lawmakers and privacy advocates.…
2 officers bailed as anti-corruption unit probes data payouts to N Irish cops
The Police Service of Northern Ireland (PSNI) has bailed two officers after they were arrested as part of a fraud investigation related to the payments to cops whose sensitive data was mistakenly published in 2023.…
Privacy Commissioner warns the ‘John Smiths’ of the world can acquire ‘digital doppelgangers’
Australia’s privacy commissioner has found that government agencies down under didn’t make enough of an effort to protect data describing “digital doppelgangers” – people who share a name and date of birth and whose government records sometimes contain data describing other people.…
Medical monitoring machines spotted stealing patient data, users warned to pull the plug ASAP
Infosec in brief The United States Food and Drug Administration has told medical facilities and caregivers that monitor patients using Contec equipment to disconnect the devices from the internet ASAP.…
What does it mean to build in security from the ground up?
Systems Approach As my Systems Approach co-author Bruce Davie and I think through what it means to apply the systems lens to security, I find that I keep asking myself what it is, exactly, that’s unique about security as a system requirement?…
Gilmore Girls fans nabbed as Eurocops dismantle two major cybercrime forums
Law enforcement officers across Europe assembled again to collectively disrupt major facilitators of cybercrime, with at least one of those cuffed apparently a fan of the dramedy series The Gilmore Girls.…
The Big Short on Cybersecurity
Partner Content Have you ever watched ? It's one of my all-time favorite movies, not just for the story but for how it handles complexity.…
Another banner year for ransomware gangs despite takedowns by the cops
If the nonstop flood of ransomware attacks doesn't already make every day feel like Groundhog Day, then a look back at 2024 – and predictions for 2025 – definitely will.…
Google to Iran: Yes, we see you using Gemini for phishing and scripting. We're onto you
Google says it's spotted Chinese, Russian, Iranian, and North Korean government agents using its Gemini AI for nefarious purposes, with Tehran by far the most frequent naughty user out of the four.…
Data resilience and data portability
Sponsored Feature Considering it has such a large share of the data protection market, Veeam doesn't talk much about backups in meetings with enterprise customers these days.…
VMware plugs steal-my-credentials holes in Cloud Foundation
Broadcom has fixed five flaws, collectively deemed "high severity," in VMware's IT operations and log management tools within Cloud Foundation, including two information disclosure bugs that could lead to credential leakage under certain conditions.…