The Register
Privacy expert put away for 9 years after 'grotesque' cyberstalking campaign
A scumbag who used to work as a privacy consultant has been put behind bars for nine years for a "grotesque" cyberstalking campaign against more than a dozen victims.…
You had a year to patch this Veeam flaw and now it's going to hurt
Yet another new ransomware gang, this one dubbed EstateRansomware, is exploiting a Veeam vulnerability that was patched more than a year ago to drop file-encrypting malware, a LockBit variant, and extort payments from victims.…
Japanese space agency spotted zero-day attacks while cleaning up attack on M365
The Japanese Space Exploration Agency (JAXA) discovered it was under attack using zero-day exploits while working with Microsoft to probe a 2023 cyberattack on its systems.…
Snowflake lets admins make MFA mandatory across all user accounts
A month after incident response giant Mandiant suggested the litany of data thefts linked to Snowflake account intrusions had the common component of lacking multi-factor authentication (MFA) controls, the cloud storage and data analytics company is offering a mandatory MFA option to admins.…
Malware that is 'not ransomware' wormed its way through Fujitsu Japan's systems
Fujitsu Japan says an unspecified "advanced" malware strain was to blame for a March data theft, insisting the strain was "not ransomware", yet it hasn't revealed how many individuals are affected.…
Ransomware crews investing in custom data stealing malware
As ransomware crews increasingly shift beyond just encrypting victims' files and demanding a payment to unlock them, instead swiping sensitive info straight away, some of the more mature crime organizations are developing custom malware for their data theft.…
Big Tech's eventual response to my LLM-crasher bug report was dire
Column Found a bug? It turns out that reporting it with a story in The Register works remarkably well ... mostly. After publication of my "Kryptonite" article about a prompt that crashes many AI chatbots, I began to get a steady stream of emails from readers – many times the total of all reader emails I'd received in the previous decade.…
ViperSoftX variant spotted abusing .NET runtime to disguise data theft
A rapidly-changing infostealer malware known as ViperSoftX has evolved to become more dangerous, according to security researchers at threat detection vendor Trellix.…
RADIUS networking protocol blasted into submission through MD5-based flaw
Cybersecurity experts at universities and Big Tech have disclosed a vulnerability in a common client-server networking protocol that allows snoops to potentially bypass user authentication via man-in-the-middle (MITM) attacks.…
Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday
Patch Tuesday Clear your Microsoft system administrator's diary: The bundle of fixes in Redmond's July Patch Tuesday is a doozy, with at least two bugs under active exploitation.…
FBI, cyber-cops zap ~1K Russian AI disinfo Twitter bots
The FBI and cybersecurity agencies in Canada and the Netherlands say they have taken down an almost 1,000-strong Twitter bot farm set up by Russian state-run RT News that used generative AI to spread disinformation to Americans and others.…
Elexon's Insight into UK electricity felled by expired certificate
Certificate Watch Demonstrating that Microsoft is not alone in its inability to keep track of certificates is UK power market biz Elexon.…
Evolve Bank & Trust confirms LockBit stole 7.6 million people's data
Evolve Bank & Trust says the data of more than 7.6 million customers was stolen during the LockBit break-in in late May, per a fresh filing with Maine's attorney general.…
Houthi rebels are operating their own GuardZoo spyware
Interview When it comes to surveillance malware, sophisticated spyware with complex capabilities tends to hog the limelight – for example NSO Group's Pegasus, which is sold to established governments. But it's actually less polished kit that you've never heard of, like GuardZoo – developed and used by Houthi rebels in Yemen – that dominates the space.…
Microsoft China staff can't log on with an Android, so Redmond buys them iThings
Microsoft China will provide staff with Apple devices so they can log on to the software giant's systems.…
Scammers double-scam victims by offering to help recover from scams
Australia's Competition and Consumer Commission has warned that scammers are targeting scam victims with fake offers to help them recover from scams.…
China's APT40 gang is ready to attack vulns within hours or days of public release.
Law enforcement agencies from eight nations, led by Australia, have issued an advisory that details the tradecraft used by China-aligned threat actor APT40 – aka Kryptonite Panda, GINGHAM TYPHOON, Leviathan and Bronze Mohawk – and found it prioritizes developing exploits for newly found vulnerabilities and can target them within hours.…
Microsoft forgets about SwiftKey's support site
Another Microsoft certificate has expired, leaving SwiftKey users that are seeking support faced with an alarming certificate error.…
Avast secretly gave DoNex ransomware decryptors to victims before crims vanished
Updated Researchers at Avast have provided decryptors to DoNex ransomware victims on the down-low since March after discovering a flaw in the crims' cryptography, the company confirmed today.…
Navigating Europe’s digital identity crossroads
Partner Content : Opening a bank account, making or receiving a payment, instructing an accountant or booking a doctor's appointment. These everyday tasks depend on identity, either proving who you are or verifying who you're dealing with.…