The Register
MPs urge government to stop Britain's phone theft wave through tech
The UK's Home Secretary should use her powers to push the tech industry to deploy stronger technical measures against the surge in phone thefts, according to a House of Commons committee.…
Sneaky Mermaid attack in Microsoft 365 Copilot steals data
Microsoft fixed a security hole in Microsoft 365 Copilot that allowed attackers to trick the AI assistant into stealing sensitive tenant data – like emails – via indirect prompt injection attacks.…
Microsoft drops surprise Windows Server patch before weekend downtime
Microsoft has released an out-of-band update to patch a critical vulnerability in Windows Server Update Services (WSUS).…
Digital ID is now less about illegal working, more about rummaging through drawers
UK Prime Minister Keir Starmer has relaunched his digital ID scheme as something that will make people's lives easier, less than four weeks after announcing it as a measure to tackle illegal working.…
Shield AI shows off not-at-all-terrifying autonomous VTOL combat drone
US defense technology biz Shield AI claims it can build a jet-powered vertical take-off and landing (VTOL) autonomous fighter drone that doesn't need a runway to operate.…
Iran's MuddyWater wades into 100+ government networks in latest spying spree
Iran's favorite muddy-footed cyberespionage crew is at it again, this time breaching more than 100 government entities across the Middle East and North Africa, according to researchers at Group-IB.…
Cyber exec with lavish lifestyle charged with selling secrets to Russia
Federal prosecutors have charged a former general manager of US government defense contractor L3Harris's cyber arm Trenchant with selling secrets to an unidentified Russian buyer for $1.3 million.…
Playtime’s over: Crooks swipe Toys R Us Canada customer data and dump it online
The Canadian outpost of retailer Toys R Us on Thursday notified customers that attackers accessed a database, stole some of their personal information, then posted the data online.…
Trump's workforce cuts blamed as America's cyber edge dulls
America's once-ambitious cyber defences are starting to rust, according to the latest annual report from the US Cyberspace Solarium Commission (CSC), which warns that policy momentum has slowed and even slipped backwards thanks to Trump-era workforce and budget cuts.…
Google nukes 3,000 YouTube videos that sowed malware disguised as cracked software
Google has taken down thousands of YouTube videos that were quietly spreading password-stealing malware disguised as cracked software and game cheats.…
SpaceX pulls plug on 2,500 Starlink terminals tied to Myanmar fraud farms
SpaceX says it has shut down thousands of Starlink terminals that were powering Myanmar's notorious scam compounds after its satellite network was found to be keeping human trafficking and cyber-fraud operations online in the country's lawless border zones.…
This free IGA tool boosts your identity security
Partner Content In a world where one wrong click can set off a catastrophic breach, organizations must control what their users have access to if they want to stop mission-critical assets from being leaked or stolen. Identity governance and administration (IGA) is as essential to the survival of your business as malware protection and secure backups.…
Forking confusing: Vulnerable Rust crate exposes uv Python packager
A vulnerability in the popular Rust crate async-tar has affected the fast uv Python package manager, which uses a forked version that's now patched – but the most widely downloaded version remains unfixed.…
Jaguar Land Rover cyber-meltdown tipped to cost the UK almost £2B
The Jaguar Land Rover (JLR) cyberattack could end up being the costliest such incident in UK history, billed at an estimated £1.9 billion and affecting over 5,000 organizations.…
UK data regulator defends decision not to investigate MoD Afghan data breach
The UK's data protection regulator declined to launch an investigation into a leak at the Ministry of Defence that risked the lives of thousands of Afghans connected with the British Armed Forces.…
Restructuring risk operations: building a business-aligned cyber strategy
Partner Content As cyber risk continues to escalate, many organizations face a disconnect between cybersecurity investments and actual risk reduction. Despite increased security budgets, formal cyber risk programs, and adoption of new frameworks, recent data shows these efforts often fail to lower risk profiles.…
Muji's minimalist calm shattered as ransomware takes down logistics partner
Japanese retailer Muji is suspending online orders after logistics partner Askul was knocked offline by a ransomware attack.…
Feds flag active exploitation of patched Windows SMB vuln
Uncle Sam's cyber wardens have warned that a high-severity flaw in Microsoft's Windows SMB client is now being actively exploited – months after it was patched.…
A shot in the dark: Can malware vaccines stop ransomware's rampage?
Feature What's better, prevention or cure? For a long time the global cybersecurity industry has operated by reacting to attacks and computer viruses. But given that ransomware has continued to escalate, more proactive action is needed.…
Zero Trust Everywhere: a new era in cybersecurity for European organizations
Partner Content Many organizations across Europe have taken steps to implement Zero Trust principles, securing users, devices, workloads, and applications. But while these efforts are critical, they can leave significant gaps in resilience and security if applied too narrowly.…