The Register
Attackers turned Citrix, Cisco 0-day exploits into custom-malware hellscape
An "advanced" attacker exploited CitrixBleed 2 and a max-severity Cisco Identity Services Engine (ISE) bug as zero-days to deploy custom malware, according to Amazon Chief Information Security Officer CJ Moses.…
Bitcoin bandit's £5B bubble bursts as cops wrap seven-year chase
The Metropolitan Police's seven-year investigation into a record-setting fraudster has ended after she was sentenced to 11 years and eight months in prison on Tuesday.…
UK's Cyber Security and Resilience Bill makes Parliamentary debut
UK government introduced the Cyber Security and Resilience (CSR) Bill to Parliament today, marking a significant overhaul of local cybersecurity legislation to sharpen the security posture of the most critical sectors.…
Aviation watchdog says organized drone attacks will shut UK airports ‘sooner or later’
Britain's aviation watchdog has warned it's only a matter of time before organized drone attacks bring UK airports to a standstill.…
China hates crypto and scams, but is now outraged USA acquired bitcoin from a scammer
China’s National Computer Virus Emergency Response Center (CVERC) has alleged a nation-state entity, probably the USA, was behind a 2020 attack on a bitcoin mining operation and by doing so has gone into bat for entities that Beijing usually blasts.…
Australia’s spy boss says authoritarian nations ready to commit ‘high-impact sabotage’
The head of Australia’s Security Intelligence Organisation (ASIO) has warned that authoritarian regimes “are growing more willing to disrupt or destroy critical infrastructure”, using cyber-sabotage.…
North Korean spies turn Google's Find Hub into remote-wipe weapon
North Korean state-backed spies have found a new way to torch evidence of their own cyber-spying – by hijacking Google's "Find Hub" service to remotely wipe Android phones belonging to their South Korean targets.…
EU's reforms of GDPR, AI slated by privacy activists for 'playing into Big Tech’s hands'
Privacy advocates are condemning the European Commission's leaked plans to overhaul digital privacy legislation, accusing officials of bypassing proper legislative processes to favor Big Tech interests.…
OWASP Top 10: Broken access control still tops app security list
The Open Worldwide Application Security Project (OWASP) just published its top 10 categories of application risks for 2025, its first list since 2021. It found that while broken access control remains the top issue, security misconfiguration is a strong second, and software supply chain issues are still prominent.…
Hitachi-owned GlobalLogic admits data stolen on 10k current and former staff
Digital engineering outfit GlobalLogic says personal data from more than 10,000 current and former employees was exposed in the wave of Oracle E-Business Suite (EBS) attacks attributed to the Clop ransomware gang. The Hitachi-owned biz joins a growing roster of high-profile victims that also now includes The Washington Post and Allianz UK.…
UK asks cyberspies to probe whether Chinese buses can be switched off remotely
UK governmental is working with the National Cyber Security Centre to understand and "mitigate" any risk that China-made imported electric buses could be remotely accessed and potentially disabled.…
Cyber insurers paid out over twice as much for UK ransomware attacks last year
The number of successful cyber insurance claims made by UK organizations shot up last year, according to the latest figures from the industry's trade association.…
UK's Ajax fighting vehicle arrives – years late and still sending crew to hospital
The British Army just received its first new armored fighting vehicle (AFV) for nearly three decades, but it is years late, hit by rising costs, is still reportedly injuring its crew, and there are questions about whether it remains relevant in the age of drone warfare. …
LLM side-channel attack could allow snoops to guess what you're talking about
Mischief-makers can guess the subjects being discussed with LLMs using a side-channel attack, according to Microsoft researchers. They told The Register that models from some providers, including Anthropic, AWS, DeepSeek, and Google, haven't been fixed, putting both personal users and enterprise communications at risk.…
Critical federal cybersecurity funding set to resume as government shutdown draws to a close - for now
The US Senate voted on Sunday to advance a short-term funding bill for the federal government, moving the country closer to ending its longest-ever shutdown. Part of the spending bill also restores critical cybersecurity programs that lapsed as the shutdown began. …
Phishers try to lure 5K Facebook advertisers with fake business pages
More than 5,000 businesses that use Facebook for advertising were bombarded by tens of thousands of phishing emails in a credential- and data-stealing campaign.…
Russian broker pleads guilty to profiting from Yanluowang ransomware attacks
A Russian national will likely face several years in US prison after pleading guilty to a range of offenses related to his work with ransomware crews.…
Allianz UK joins growing list of Clop’s Oracle E-Business Suite victims
Allianz UK confirms it was one of the many companies that fell victim to the Clop gang's Oracle E-Business Suite (EBS) attack after crims reported that they had attacked a subsidiary.…
As AI enables bad actors, how are 3,000+ teams responding?
Partner Content This year has shown just how quickly new exposures can emerge, with AI-generated code shipped before review, cloud sprawl racing ahead of controls, and shadow IT opening blind spots. Supply chain compromises have disrupted transport, manufacturing, and other critical services. On the attacker side, AI-assisted exploit development is making it faster than ever to turn those weaknesses into working attacks.…
Cisco creating new security model using 30 years of data describing cyber-dramas and saves
Exclusive Cisco is working on a new AI model that will more than double the number of parameters used to train its current flagship Foundation-Sec-8B.…