FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” September 15th 2025The Register - Security

Security begins with visibility: How IGA brings hidden access risks to light

Who has access to what? Without centralized governance, orgs struggle to answer this simple question.

Partner Content From the moment users log onto their machines, access rights shape their experience. Access rights determine which apps they can run, which directories they can open, and what information they can retrieve.…

Former FinWise employee may have accessed nearly 700K customer records

Bank says incident went undetected for over a year before discovery in June

A US fintech biz is writing to nearly 700,000 customers because a former employee may have accessed or acquired their data after leaving the company.…

Nork snoops whip up fake South Korean military ID with help from ChatGPT

Kimsuky gang proves that with the right wording, you can turn generative AI into a counterfeit factory

North Korean spies used ChatGPT to generate a fake military ID for use in an espionage campaign against a South Korean defense-related institution, according to new research.…

China turns the screws on Nvidia with antitrust probe

Chip giant accused of breaching conditions of $6.9B Mellanox takeover

China has dealt Nvidia another blow, finding the chipmaker in violation of the country's anti-monopoly Law and escalating a long-running regulatory headache into a full investigation.…

Jaguar Land Rover supply chain workers must get Covid-style support, says union

As post-cyberattack layoffs begin, labor org argues UK goverment should step in

The UK's chief automotive workers' union is calling on the government to establish a Covid-esque furlough scheme for the thousands of individuals who face losing their jobs due to the cyber-related downtime at Jaguar Land Rover.…

UK Lords take aim at Ofcom's 'child-protection' upgrades to Online Safety Act

Peers will quiz campaigners on whether Ofcom's new measures will actually work, or just add more compliance pain

The House of Lords is about to put the latest child-protection plans of UK regulator the Office of Communications (Ofcom) under the microscope.…

Cyber-scam camp operators shift operations to vulnerable countries as sanctions strike

PLUS: Japan woos Micron, again; China launches chip dumping probe; Mitsubishi expands opsec empire; and more!

Asia in Brief Criminals appear to be moving cyber-scam centers to vulnerable countries.…

15 ransomware gangs β€˜go dark’ to enjoy 'golden parachutes'

PLUS: China's Great Firewall springs a leak; FBI issues rare 'Flash Alert' of Salesforce attacks; $10m bounty for alleged Russian hacker; and more

Infosec In Brief 15 ransomware gangs, including Scattered Spider and Lapsus$, have announced that they are going dark, and say no more attacks will be carried out in their name.…

Yesterday β€” September 14th 2025The Register - Security

Data destruction done wrong could cost your company millions

Doing a simple system reset may not be enough to save you from fines and lawsuits

With the end of Windows 10's regular support cycle fast approaching, and a good five years since the COVID pandemic spurred a wave of hardware replacements to support remote work, many IT departments are in the process of refreshing their fleets. But what they do with decommissioned systems is just as important as the shiny new ones they buy.…

Before yesterdayThe Register - Security

HybridPetya: More proof that Secure Boot bypasses are not just an urban legend

Although it hasn't been seen in the wild yet

A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows systems, making it the fourth publicly known bootkit capable of punching through the feature and hijacking a PC before the operating system loads.…

Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages

A similar vuln on Apple devices was used against 'specific targeted users'

Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow remote code execution on affected devices.…

All your vulns are belong to us! CISA wants to maintain gov control of CVE program

Get ready for a fight over who steers the global standard for vulnerability identification

The Cybersecurity and Infrastructure Security Agency (CISA) nearly let the Common Vulnerabilities and Exposures (CVE) program lapse earlier this year, but a new "vision" document it released this week signals that it now wants more control over the global standard for vulnerability identification.…

1,200 undergrads hung out to dry after jailbreak attack on laundry machines

Dorm management refuses to cover costs after payment system borked

More than a thousand university students in the Netherlands must continue to travel to wash their clothes after their building management company failed to bring its borked smart laundry machines back online.…

Privacy activists warn digital ID won’t stop small boats – but will enable mass surveillance

Big Brother Watch says a so-called BritCard could turn daily life into one long identity check – and warn that Whitehall can’t be trusted to run

A national digital ID could hand the government the tools for population-wide surveillance – and if history is anything to go by, ministers probably couldn't run it without cocking it up.…

Hack to school: Parents told to keep their little script kiddies in line

UK data watchdog says students behind most education cyberattacks

The UK's data protection watchdog says more than half of cyberattacks in schools are caused by students, and that parents should act early to prevent their offspring from falling into the wrong crowds.…

Huntress's 'hilarious' attacker surveillance splits infosec community

Ethical concerns raised after crook offered themselves up on silver platter

Security outfit Huntress has been forced onto the defensive after its latest research – described by senior staff as "hilarious" – split opinion across the cybersecurity community.…

We're number 1! America now leads the world in surveillanceware investment

Atlantic Council warns US investors are fueling a market that undermines national security

After years of being dominated by outsiders, the computer surveillance software industry is booming in the United States as investors rush into the ethically dodgy but highly lucrative field.…

Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand

Okta uncovers new phishing-as-a-service operation with 'multiple entities' falling victim

Multiple attackers using a new phishing service dubbed VoidProxy to target organizations' Microsoft and Google accounts have successfully stolen users' credentials, multi-factor authentication codes, and session tokens in real time, according to security researchers.…

AI-powered penetration tool, an attacker's dream, downloaded 10K times in 2 months

Shady, China-based company, all the apps needed for a fully automated attack - sounds totally legit

Villager, a new penetration-testing tool linked to a suspicious China-based company and described by researchers as "Cobalt Strike's AI successor," has been downloaded about 10,000 times since its release in July.…

Anti-DDoS outfit walloped by record packet flood

FastNetMon says 1.5 Gpps deluge from hijacked routers, IoT kit nearly drowned scrubbing shop

A DDoS mitigation provider was given a taste of the poison it tries to prevent, after being smacked by one of the largest packet-rate attacks ever recorded – a 1.5 billion packets per second (1.5 Gpps) flood that briefly threatened to knock it off the internet.…

Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets

AMD Zen hardware and Intel Coffee Lake affected

If you thought the world was done with side-channel CPU attacks, think again. ETH Zurich has identified yet another Spectre-based transient execution vulnerability that affects AMD Zen CPUs and Intel Coffee Lake processors by breaking virtualization boundaries.…

Senator blasts Microsoft for 'dangerous, insecure software' that helped pwn US hospitals

Ron Wyden urges FTC to probe failure to secure Windows after attackers used Kerberoasting to cripple Ascension

Microsoft is back in the firing line after US Senator Ron Wyden accused Redmond of shipping "dangerous, insecure software" that helped cybercrooks cripple one of America's largest hospital networks.…

Brussels faces privacy crossroads over encryption backdoors

Over 600 security boffins say planned surveillance crosses the line

Europe, long seen as a bastion of privacy and digital rights, will debate this week whether to enforce surveillance on citizens' devices.…

Attacker steals customer data from Brit rail operator LNER during break-in at supplier

Major UK player cagey on specifics but latest attack follows string blamed on 'third party' suppliers

One of the UK's largest rail operators, LNER, is the latest organization to spill user data via a third-party data breach.…

Experts scrutinized Ofcom's Online Safety Act governance. They're concerned

Academics and OSA stakeholders say watchdog needs to amend how controversial legislation is enforced

Industry experts expressed both concern and sympathy for Ofcom, the Brit regulator that is overseeing the Online Safety Act, as questions mount over the effectiveness of the controversial legislation.…

BAE Systems surfaces autonomous submarine for military use

Battery powered now, fuel-cells tomorrow - all packed in a shipping box

Following a series of trials, defense biz BAE Systems says it is readying an autonomous military submarine for the end of next year.…

NASA bars Chinese citizens from its facilities, networks, even Zoom calls

You don’t need to be a rocket scientist to figure out the reasons why

NASA has barred Chinese nationals from accessing its premises and assets, even those who hold visas that permit them to reside in the USA.…

Beijing went to 'EggStreme' lengths to attack Philippines military, researchers say

Ovoid-themed in-memory malware offers a menu for mayhem

Infosec outfit Bitdefender says it’s spotted a strain of in-memory malware that looks like the work of Chinese advanced persistent threat groups that wanted to achieve persistent access at a β€œmilitary company” in the Philippines.…

Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks

Patch, turn on MFA, and restrict access to trusted networks…or else

Affiliates of the Akira ransomware gang are again exploiting a critical SonicWall vulnerability abused last summer, after a suspected zero-day flaw actually turned out to be related to a year-old bug.…

Apple slips up on ChillyHell macOS malware, lets it past security . . . for 4 years

'We do believe that this was likely the creation of a cybercrime group,' threat hunter tells The Reg

ChillyHell, a modular macOS backdoor believed to be long dormant, has likely been infecting computers for years while flying under the radar, according to security researchers who spotted a malware sample uploaded to VirusTotal in May.…

Jaguar Land Rover U-turns to confirm 'some data' affected after cyber prang

Systems offline as specialists continue to comb through wreckage

Jaguar Land Rover (JLR) says "some data" was affected after the luxury car maker suffered a digital break-in early last week.…

Uncle Sam indicts alleged ransomware kingpin tied to $18B in damages

Prosecutors claim Ukrainian ran LockerGoga, MegaCortex, and Nefilim ops – $11M bounty on his head

A Ukrainian national faces serious federal charges and an $11 million bounty after allegedly orchestrating ransomware operations that caused an estimated $18 billion in damages across hundreds of organizations worldwide.…

Flu jab email mishap exposes hundreds of students' personal data

One parent expressed concern for their child's safety

A clumsy data breach has affected hundreds of children at a Birmingham secondary school.…

Cybercrooks ripped the wheels off at Jaguar Land Rover. Here's how not to get taken for a ride

Are you sure you know who has access to your systems?

Feature Jaguar Land Rover (JLR) is the latest UK household name to fall victim to a major cyberattack. IT systems across multiple sites have been offline for over a week after what the company described as a "severe disruption."…

This Patch Tuesday, SAP is the worst offender and Microsoft users can kinda chill

ERP giant patches flaw that allows total takeover of NetWeaver, Microsoft has nothing under attack for once

September’s Patch Tuesday won’t require Microsoft users to rapidly repair rancid software, but SAP users need to move fast to address extremely dangerous bugs.…

More packages poisoned in npm attack, but would-be crypto thieves left pocket change

Miscreants cost victims time rather than money

During the two-hour window on Monday in which hijacked npm versions were available for download, malware-laced packages reached one in 10 cloud environments, according to Wiz researchers. But crypto-craving crims did little more than annoy defenders.…

New cybersecurity rules land for Defense Department contractors

Now if only someone would remember to apply those rules inside the DoD

It's about to get a lot harder for private companies that are lax on cybersecurity to get a contract with the Pentagon, as the Defense Department has finalized a rule requiring contractor compliance with its Cybersecurity Maturity Model Certification (CMMC) program.…

Defense Dept didn't protect social media accounts, left stream keys out in public

'The practice… has since been fixed,' Pentagon official tells The Reg

The US Department of Defense, up until this week, routinely left its social media accounts wide open to hijackers via stream keys - unique, confidential identifiers generated by streaming platforms for broadcasting content. If exposed, these keys can allow attackers to output anything they want from someone else's channel.…

No gains, just pains as 1.6M fitness phone call recordings exposed online

HelloGym's data security clearly skipped leg day

Exclusive Sensitive info from hundreds of thousands of gym customers and staff – including names, financial details, and potentially biometric data in the form of audio recordings – was left sitting in an unencrypted, non-password protected database, according to a security researcher who shut it down.…

What the Plex? Streaming service suffers yet another password spill

For the third time in a decade

Streaming platform Plex is warning some users to reset their passwords after suffering yet another breach.…

Nokia successor HMD spawns secure device biz with Euro-made smartphone

Ivalo XE handset targets governments and security critical sectors, though Qualcomm silicon keeps it tied to the US

Finnish phone maker HMD Global is launching a business unit called HMD Secure to target governments and other security-critical customers, and has its first device ready to go.…

Anthropic's Claude Code runs code to test if it is safe – which might be a big mistake

AI security reviews add new risks, say researchers

App security outfit Checkmarx says automated reviews in Anthropic's Claude Code can catch some bugs but miss others – and sometimes create new risks by executing code while testing it.…

UK toughens Online Safety Act with ban on self-harm content

Charities welcome change, but critics warn the law is already too broad

Tech companies will be legally required to prevent content involving self-harm from appearing on their platforms – rather than responding and removing it – in a planned amendment to the UK's controversial Online Safety Act.…

Forget disappearing messages – now Signal will store 100MB of them for you for free

Including messages sent to users, a potential problem for the privacy-conscious

Updated Encrypted messaging app Signal is rolling out a free storage system for its users, with extra space if folks are willing to pay for it.…

WhatsApp's former security boss claims reporting infosec failings led to ousting

Meta shrugs off allegations of improper dismissal, ignoring privacy and security

WhatsApp's former head of security, Attaullah Baig, has filed a lawsuit against its parent company, Meta, alleging that the social media megalith retaliated against him for reporting security failings that violated legal commitments.…

The US government has no idea how many cybersecurity pros it employs

Auditors find federal cybersecurity workforce data messy, incomplete, and unreliable

The US federal government employs tens of thousands of cybersecurity professionals at a cost of billions per year – or at least it thinks it does, as auditors have found the figures are incomplete and unreliable. …

Drift massive attack traced back to loose Salesloft GitHub account

Meanwhile the victim count grows

The Salesloft Drift breach that compromised "hundreds" of companies including Google, Palo Alto Networks, and Cloudflare, all started with miscreants gaining access to the Salesloft GitHub account in March.…

Dev snared in crypto phishing net, 18 npm packages compromised

Popular npm packages debug, chalk, and others hijacked in massive supply chain attack

Crims have added backdoors to at least 18 npm packages after developer Josh Junon inadvertently authorized a reset of the two-factor authentication protecting his npm account.…

Salt Typhoon used dozens of domains, going back five years. Did you visit one?

Plus ties to the Chinese spies who hacked Barracuda email gateways

Security researchers have uncovered dozens of domains used by Chinese espionage crew Salt Typhoon to gain stealthy, long-term access to victim organizations going back as far as 2020.…

PACER buckles under MFA rollout as courts warn of support delays

Busy lawyers on hold for five hours as staff handhold users into deploying the security measure

US courts have warned of delays as PACER, the system for accessing court documents, struggles to support users enrolling in its mandatory MFA program.…

CISA sounds alarm over TP-Link wireless routers under attack

Plus: Google clears up Gmail concerns, NSA drops SBOM bomb, Texas sues PowerSchool, and more

Infosec in brief The US Cybersecurity and Infrastructure Security Agency (CISA) has said two flaws in routers made by Chinese networking biz TP-Link are under active attack and need to be fixed – but there's another flaw being exploited as well.…

UK tech minister booted out in weekend cabinet reshuffle

Fallout from latest political drama sparks a changing of the guard

UK prime minister Sir Keir Starmer cleared out the officials in charge of tech and digital law in a dramatic cabinet reshuffle at the weekend.…

The crazy, true story behind the first AI-powered ransomware

tldr; boffins did it

interview It all started as an idea for a research paper. …

Shell to pay: Crims invade your PC with CastleRAT malware, now in C and Python

Pro tip, don't install PowerShell commands without approval

A team of data thieves has doubled down by developing its CastleRAT malware in both Python and C variants. Both versions spread by tricking users into pasting malicious commands through a technique called ClickFix, which uses fake fixes and login prompts.…

Critical, make-me-super-user SAP S/4HANA bug under active exploitation

9.9-rated flaw on the loose, so patch now

A critical code-injection bug in SAP S/4HANA that allows low-privileged attackers to take over your SAP system is being actively exploited, according to security researchers.…

Knock-on effects of software dev break-in hit schools trust

Affinity Learning Partnership warns staff after Intradev breach

A major UK education trust has warned staff that their personal information may have been compromised following a cyberattack on software developer Intradev in August.…

Attackers snooping around Sitecore, dropping malware via public sample keys

You cut and pasted the machine key from the official documentation? Ouch

Unknown miscreants are exploiting a configuration vulnerability in multiple Sitecore products to achieve remote code execution via a publicly exposed key and deploy snooping malware on infected machines.…

Boffins build automated Android bug hunting system

AI agent system said to have found more than 100 zero-day flaws in production apps

AI models get slammed for producing sloppy bug reports and burdening open source maintainers with hallucinated issues, but they also have the potential to transform application security through automation.…

China-aligned crew poisons Windows servers to manipulate Google results

Defrauding search with custom malware, Potato-family exploits

A new China-aligned cybercrime crew named GhostRedirector has compromised at least 65 Windows servers worldwide - spotted in a June internet scan - using previously undocumented malware to juice gambling sites' rankings in Google search, according to ESET researchers.…

Enterprises sticking with Windows 10 could shell out billions for continued support

Nexthink estimates ESU bills could top $7.3B as millions of devices set to miss upgrade deadline

Free support is ending for many editions of Windows 10 on October 14, and enterprises unable to make the jump are on the hook for billions to keep the fixes flowing.…

❌