❌

Reading view

Yahoo<i>!</i> Japan’s owner consolidating 164 OpenStack clusters into one

Customizations are causing pain so new cloud will stick to upstream cuts of the open source stack

LY Corporation, the Japanese web giant that dominates messaging, e-commerce and payments in many Asian countries, has revealed it is replacing a heavily-customized OpenStack cloud with a more conventional cut of the open source cloud stack – and making massive consolidations along the way.…

  •  

AI agents found vulns in this popular Linux and Unix print server

CUPS server shown spilling out remote code execution and root access

In the latest chapter on leaky CUPS, a security researcher and his band of bug-hunting agents have found two flaws that can be chained to allow an unauthenticated attacker to remotely execute code and achieve root file overwrite on the network.…

  •  

Hybrid work, expanded risk: what needs to change

A practical look at securing identities, devices and applications wherever work happens

Webinar Promo The shift to hybrid work has reshaped the enterprise perimeter. Users are logging in from home networks, shared spaces and unmanaged devices, while applications span on-prem systems and multiple clouds. Traditional security models were not designed for this level of fragmentation, leaving many organizations struggling to maintain visibility and control without adding friction.…

  •  

The company's biggest security hole lived in the breakroom

Connected devices can leave an otherwise secure network vulnerable

Pwned Welcome to Pwned, The Register's new column, where we highlight the worst infosec own goals so you can, hopefully, protect against them. Caffeine is an essential tool for most IT defenders, so, on balance, we're sure it has protected against a lot more exploits than it has caused. But in this case, the desire for everyone's favorite stimulant led to a massive breach.…

  •  

UK manufacturers under cyber fire with 80% reporting attacks

ESET says factory outages, lost revenue, and supply chain disruption are becoming routine

Nearly 80 percent of British manufacturers say they've been hit by a cyber incident in the past year, as new research suggests disruption on the factory floor is no longer an exception but business as usual.…

  •  

Don't open that WhatsApp message, Microsoft warns

How to avoid social engineering attacks? Employee training tops the list

Be careful what you click on. Miscreants are abusing WhatsApp messages in a multi-stage attack that delivers malicious Microsoft Installer (MSI) packages, allowing criminals to control victims' machines and access all of their data.…

  •  

Iran targets M365 accounts with password-spraying attacks

Researchers say some targets correlate with cities hit by Iranian missile strikes

Suspected Iran-linked threat actors are conducting password-spraying attacks against hundreds of organizations, primarily Middle Eastern municipalities, in campaigns that security researchers believe may have been aimed at supporting bomb-damage assessment following missile strikes.…

  •  

Supply chain blast: Top npm package backdoored to drop dirty RAT on dev machines

Hijacked maintainer account let attackers slip cross-platform trojan into 100M-downloads-a-week Axios

Updated One of npm's most widely used HTTP client libraries briefly became a malware delivery vehicle after attackers hijacked a maintainer's account and slipped a remote-access trojan (RAT) into two seemingly legitimate axios releases, in what's being described as "one of the most impactful npm supply chain attacks on record."…

  •  
❌