FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” December 16th 2025The Register - Security

Amazon security boss blames Russia's GRU for years-long energy-sector hacks

'Sustained focus on Western critical infrastructure'

Russia's Main Intelligence Directorate (GRU) is behind a years-long campaign targeting energy, telecommunications, and tech providers, stealing credentials and compromising misconfigured devices hosted on AWS to give the Kremlin's snoops persistent access to sensitive networks, according to Amazon's security boss.…

Yesterday β€” December 15th 2025The Register - Security

China, Iran are having a field day with React2Shell, Google warns

Who hasn't exploited this max-severity flaw?

At least five more Chinese spy crews, Iran-linked goons, and financially motivated criminals are now attacking React2Shell, a maximum-severity flaw in the widely used React JavaScript library, according to Google.…

Delay to European Central Bank messaging project cost the Bank of England Β£23M

Watchdog links schedule change to replanning of UK payments system overhaul

The European Central Bank's (ECB) decision to delay its move to a new messaging standard in 2022 ended up costing the Bank of England Β£23 million as it was forced to adjust migration to a new settlement system to avoid compounding risks.…

JLR: Payroll data stolen in cybercrime that shook UK economy

Automaker admits raid that crippled its factories in August led to the theft of sensitive info

Jaguar Land Rover (JLR) has reportedly told staff the cyber raid that crippled its operations in August didn't just bring production to a screeching halt – it also walked off with the personal payroll data of thousands of employees.…

Apple, Google forced to issue emergency 0-day patches

Both admit attackers were already exploiting the bugs, with scant detail and hints of spyware-grade abuse

Apple and Google have both issued emergency patches after zero-day bugs were caught being actively exploited in what the companies describe as "sophisticated" real-world attacks.…

Denmark takes a Viking swing at VPN-enabled piracy

Minister insists 'modest' bill is not an assault on privacy-preserving tech

The Danish government wants the public to weigh in on its proposed laws restricting use of VPNs to access certain corners of the internet.…

Legal protection for ethical hacking under Computer Misuse Act is only the first step

I'm dreaming of a white hat mass

Opinion It was 40 years ago that four young British hackers set about changing the law, although they didn't know it at the time. It was a cross-platform attack including a ZX Spectrum, a BBC Micro, and a Tatung Einstein slamming British Telecom's Prestel service over dial-up modems at 75 bits per second.…

Starlink claims Chinese launch came within 200 meters of broadband satellite

PLUS: Drugs found in ink cartridges; Censorship fighters criticize Vultr; Coupang CEO resigns; And more!

Asia In Brief A SpaceX executive has claimed that a Chinese satellite launch came within 200 meters of hitting a Starlink satellite.…

Honeypots can help defenders, or damn them if implemented badly

PLUS: Crims could burn your AI budgets thanks to weak defaults; CISA's top 25 vulns for 2025; And more

Infosec In Brief The UK's National Cyber Security Centre (NCSC) has found that cyber-deception tactics such as honeypots and decoy accounts designed to fool attackers can be useful if implemented very carefully.…

Before yesterdayThe Register - Security

Microsoft RasMan DoS 0-day gets unofficial patch - and a working exploit

Exploit hasn't been picked up by any malware detection engines, CEO tells The Reg

A Microsoft zero-day vulnerability that allows an unprivileged user to crash the Windows Remote Access Connection Manager (RasMan) service now has a free, unofficial patch - with no word as to when Redmond plans to release an official one - along with a working exploit circulating online.…

New React vulns leak secrets, invite DoS attacks

And the earlier React2Shell patch is vulnerable

If you're running React Server Components, you just can't catch a break. In addition to already-reported flaws, newly discovered bugs allow attackers to hang vulnerable servers and potentially leak Server Function source code, so anyone using RSC or frameworks that support it should patch quickly.…

Microsoft promises more bug payouts, with or without a bounty program

Critical vulnerabilities found in third-party applications eligible for award under 'in scope by default' move

Microsoft is overhauling its bug bounty program to reward exploit hunters for finding vulnerabilities across all its products and services, even those without established bounty schemes.…

Uncle Sam sues ex-Accenture manager over Army cloud security claims

Justice Department alleges federal auditors were misled over compliance with FedRAMP and DoD requirements

The US is suing a former senior manager at Accenture for allegedly misleading the government about the security of an Army cloud platform.…

UK watchdog urged to probe GDPR failures in Home Office eVisa rollout

Rights groups say digital-only record is leaking data and courting trouble

Civil society groups are urging the UK's data watchdog to investigate whether the Home Office's digital-only eVisa scheme is breaching GDPR, sounding the alarm about systemic data errors and design failures that are exposing sensitive personal information while leaving migrants unable to prove their lawful status.…

Half of exposed React servers remain unpatched amid active exploitation

Wiz says React2Shell attacks accelerating, ranging from cryptominers to state-linked crews

Half of the internet-facing systems vulnerable to a fast-moving React remote code execution flaw remain unpatched, even as exploitation has exploded into more than a dozen active attack clusters ranging from bargain-basement cryptominers to state-linked intrusion tooling.…

Crypto-crasher Do Kwon jailed for 15 years over $40bn UST bust

Judge said his fraud was on 'epic, generational scale'

Terraform Labs founder Do Kwon will spend 15 years in jail after pleading guilty to committing fraud.…

Russian hackers debut simple ransomware service, but store keys in plain text

Operators accidentally left a way for you to get your data back

CyberVolk, a pro-Russian hacktivist crew, is back after months of silence with a new ransomware service. There's some bad news and some good news here.…

Google fixes super-secret 8th Chrome 0-day

No details, no CVE, update your browser now

Google issued an emergency fix for a Chrome vulnerability already under exploitation, which marks the world's most popular browser's eighth zero-day bug of 2025.…

LastPass hammered with Β£1.2M fine for 2022 breach fiasco

UK data regulator says failures were unacceptable for a company managing the world's passwords

The UK's Information Commissioner's Office (ICO) says LastPass must cough up Β£1.2 million ($1.6 million) after its two-part 2022 data breach compromised information from up to 1.6 million UK users.…

Researcher claims Salt Typhoon spies attended Cisco training scheme

Skills gained later fed Beijing's cyber operations, according to SentinelLabs expert

A security researcher specializing in tracking China threats claims two of Salt Typhoon's members were former attendees of a training scheme run by Cisco.…

10K Docker images spray live cloud creds across the internet

Flare warns devs are unwittingly publishing production-level secrets

Docker Hub has quietly become a treasure trove of live cloud keys and credentials, with more than 10,000 public container images exposing sensitive secrets from over 100 companies, including a Fortune 500 firm and a major bank.…

Users report chaos as Legal Aid Agency stumbles back online after cyberattack

Workers frustrated with security-first changes to workflows and teething issues

Exclusive Seven months after a landmark cyberattack, the UK's Legal Aid Agency (LAA) says it's returning to pre-breach operations, although law firms are still wrestling with buggy and more laborious systems.…

700+ self-hosted Gits battered in 0-day attacks with no fix imminent

More than half of internet-exposed instances already compromised

Attackers are actively exploiting a zero-day bug in Gogs, a popular self-hosted Git service, and the open source project doesn't yet have a fix.…

US extradites Ukrainian woman accused of hacking meat processing plant for Russia

The digital intrusion allegedly caused thousands of pounds of meat to spoil and triggered an ammonia leak in the facility

A Ukrainian woman accused of hacking US public drinking water systems and a meat processing facility on behalf of Kremlin-backed cyber groups was extradited to the US earlier this year and will stand trial in early 2026.…

Microsoft won't fix .NET RCE bug affecting slew of enterprise apps, researchers say

Devs and users should know better, Microsoft tells watchTowr

Updated Security researchers have revealed a .NET security flaw thought to affect a host of enterprise-grade products that they say Microsoft refuses to fix.…

Protecting value at risk - the role of a risk operations center

Why should Keith Richards’ fingers inform your approach to risk?

Partner Content For years, celebrities have insured their body parts for vast sums of money. Mariah Carey allegedly insured her voice and legs for $70 million during a tour, according to TMZ; and Lloyd’s of LondonΒ was reported to have insured a wide range of celebrity body parts, from restauranteur Egon Ronay’s taste budsΒ to the fingers of Rolling Stones’ guitarist Keith Richards, which were insured for $1.6 million. …

Crisis in Icebergen: How NATO crafts stories to sharpen cyber skills

1,500 military digital defenders spent the past week cleaning up a series of cyberattacks on fictional island

feature Andravia and Harbadus – two nations so often at odds with one another – were once again embroiled in conflict over the past seven days, which thoroughly tested NATO's cybersecurity experts' ability to coordinate defenses across battlefield domains.…

Microsoft reports 7.8-rated zero day, plus 56 more in December Patch Tuesday

Plus critical critical Notepad++, Ivanti, and Fortinet updates, and one of these patches an under-attack security hole

Updated Happy December Patch Tuesday to all who celebrate. This month's patch party includes one Microsoft flaw under exploitation, plus two others listed as publicly known – but just 57 CVEs in total from Redmond.…

How to answer the door when the AI agents come knocking

Identity management vendors like Okta see an opening to calm CISOs worried about agents running amok

The fear of AI agents running amok has thus far halted the wide deployment of these digital workhorses, Okta's president of Auth0, Shiv Ramji, told The Register.…

Porsche panic in Russia as pricey status symbols forget how to car

Satellite silence trips immobilizers, leaving owners stuck

Hundreds of Porsches in Russia were rendered immobile last week, raising speculation of a hack, but the German carmaker tells The Register that its vehicles are secure.…

As humanoid robots enter the mainstream, security pros flag the risk of botnets on legs

Have we learned nothing from sci-fi films and TV shows?

Interview Imagine botnets in physical form and you've got a pretty good idea of what could go wrong with the influx of AI-infused humanoid robots expected to integrate into society over the next few decades.…

UK to Europe: The time to counter Russia's information war machine is now

Foreign secretary set to address senior diplomats later today

The UK's foreign secretary is calling for closer collaboration with Europe to combat the growing threat of information warfare as hybrid attacks target countries on the continent.…

UK finally vows to look at 35-year-old Computer Misuse Act

As Portugal gives researchers a pass under cybersecurity law

Portugal has become the latest country to carve out protections for researchers under its cybersecurity law.…

Whitehall rejects Β£1.8B digital ID price tag – but won't say what it will cost

Officials insist OBR relied on 'early estimate' and real figure won't emerge until next year

The head of the department delivering the UK government's digital identity scheme has rejected the Β£1.8 billion cost forecast by the Office for Budget Responsibility (OBR), but is not willing to provide an alternative until after a delayed consultation on the plans.…

Researchers spot 700 percent increase in hypervisor ransomware attacks

Get your Hyper-V and VMware ESXi setups in order, people

Researchers at security software vendor Huntress say they’ve noticed a huge increase in ransomware attacks on hypervisors and urged users to ensure they’re as secure as can be and properly backed up.…

193 cybercrims arrested, accused of plotting 'violence-as-a-service'

Minors groomed to kill and intimidate victims

Nearly 200 people, including minors accused of involvement in murder plots, have been arrested over the last six months as part of Europol's Operational Taskforce (OTF) GRIMM. The operation targets what cops call "violence-as-a-service" - crime crews recruiting kids and teens online to carry out contract killings and other real-world attacks.…

UK moves to strengthen undersea cable defenses as Russian snooping ramps up

Atlantic Bastion combines AI systems with warships to counter increased surveillance

The UK government has announced enhanced protection for undersea cables using autonomous vessels alongside crewed warships and aircraft, responding to escalating Russian surveillance activities.…

Home Office kept police facial recognition flaws to itself, UK data watchdog fumes

Regulator disappointed as soon-to-be-scrapped algo's problems remained a secret despite consistent engagement

The UK's data protection watchdog has criticized the Home Office for failing to disclose significant biases in police facial recognition technology, despite regular engagement between the organizations.…

Barts Health seeks High Court block after Clop pillages NHS trust data

Body confirms patient and staff details siphoned via Oracle EBS flaw as gang threatens to leak haul

Barts Health NHS Trust has confirmed that patient and staff data was stolen in Clop's mass-exploitation of Oracle's E-Business Suite (EBS), and says it is now taking legal action in an effort to stop the gang publishing any of the snatched information.…

Block all AI browsers for the foreseeable future: Gartner

Analysts worry lazy users could have agents complete mandatory infosec training, and attackers could do far nastier things

Agentic browsers are too risky for most organizations to use, according to analyst firm Gartner.…

China’s first reusable rocket explodes, but its onboard Ethernet network flew

PLUS: South Korea to strengthen security standards; Canon closes Chinese printer plant; APAC datacenter capacity to triple by 2029; And more

Asia In Brief Chinese rocketry outfit LandSpace last week flew what it hoped would be the country’s first reusable rocket, only to watch it explode while attempting to land.…

Apache warns of 10.0-rated flaw in Tika metadata ingestion tool

PLUS: New kind of DDOS from the Americas; Predator still hunting spyware targets; NIST issues IoT advice; And more!

Infosec in Brief The Apache Foundation last week warned of a 10.0-rated flaw in its Tika toolkit.…

Death to one-time text codes: Passkeys are the new hotness in MFA

Wanna know a secret?

Whether you're logging into your bank, health insurance, or even your email, most services today do not live by passwords alone. Now commonplace, multifactor authentication (MFA) requires users to enter a second or third proof of identity. However, not all forms of MFA are created equal, and the one-time passwords orgs send to your phone have holes so big you could drive a truck through them.…

Crims using social media images, videos in 'virtual kidnapping' scams

Proof of life? Or an active social media presence?

Criminals are altering social media and other publicly available images of people to use as fake proof of life photos in "virtual kidnapping" and extortion scams, the FBI warned on Friday. …

Novel clickjacking attack relies on CSS and SVG

Who needs JavaScript?

Security researcher Lyra Rebane has devised a novel clickjacking attack that relies on Scalable Vector Graphics (SVG) and Cascading Style Sheets (CSS).…

Cloudflare blames Friday outage on borked fix for React2shell vuln

Security community needs to rally and share more info faster, one researcher says

Amid new reports of attackers pummeling a maximum security hole (CVE-2025-55182) in the React JavaScript library, Cloudflare's technology chief said his company took down its own network, forcing a widespread outage early Friday, to patch React2Shell.…

Asus supplier hit by ransomware attack as gang flaunts alleged 1 TB haul

Laptop maker says a vendor breach exposed some phone camera code, but not its own systems

Asus has admitted that a third-party supplier was popped by cybercrims after the Everest ransomware gang claimed it had rifled through the tech titan's internal files.…

Beijing-linked hackers are hammering max-severity React bug, AWS warns

State-backed attackers started poking flaw as soon as it dropped – anyone still unpatched is on borrowed time

Amazon has warned that China-nexus hacking crews began hammering the critical React "React2Shell" vulnerability within hours of disclosure, turning a theoretical CVSS-10 hole into a live-fire incident almost immediately.…

UK pushes ahead with facial recognition expansion despite civil liberties backlash

Plan would create statutory powers for police use of biometrics, prompting warnings of mass surveillance

The UK government has kicked off plans to ramp up police use of facial recognition, undeterred by a mounting civil liberties backlash and fresh warnings that any expansion risks turning public spaces into biometric dragnets.…

Bots, bias, and bunk: How can you tell what's real on the net?

You can improve the odds by combining skepticism, verification habits, and a few technical checks

Opinion Liars, cranks, and con artists have always been with us. It's just that nowadays their reach has gone from the local pub to the globe.…

An AI for an AI: Anthropic says AI agents require AI defense

Automated software keeps getting better at pilfering cryptocurrency

Anthropic could have scored an easy $4.6 million by using its Claude AI models to find and exploit vulnerabilities in blockchain smart contracts.…

PRC spies Brickstormed their way into critical US networks and remained hidden for years

'Dozens' of US orgs infected

Chinese cyberspies maintained long-term access to critical networks – sometimes for years – and used this access to infect computers with malware and steal data, according to Thursday warnings from government agencies and private security firms.…

Hegseth needs to go to secure messaging school, report says

He's not alone: DoD inspector general says the whole Defense Department has a messaging security problem

US Defense Secretary Pete Hegseth definitely broke the rules when he sent sensitive information to a Signal chat group, say Pentagon auditors, but he's not the only one using insecure messaging, and everyone needs better training.…

Twins who hacked State Dept hired to work for gov again, now charged with deleting databases

And then they asked an AI to help cover their tracks

Vetting staff who handle sensitive government systems is wise, and so is cutting off their access the moment they're fired. Prosecutors say a federal contractor learned this the hard way when twin brothers previously convicted of hacking-related offenses allegedly used lingering access to delete nearly 100 government databases, including systems tied to Homeland Security and other agencies, within minutes of being terminated.…

Microsoft quietly shuts down Windows shortcut flaw after years of espionage abuse

Silent Patch Tuesday mitigation ends ability to hide malicious commands in .lnk files

Microsoft has quietly closed off a critical Windows shortcut file bug long abused by espionage and cybercrime networks.…

Aisuru botnet turns Q3 into a terabit-scale stress test for the entire internet

Cloudflare data shows 29.7 Tbps record-breaker landed amid 87% surge in network-layer attacks

The internet has spent the past three months ducking for cover as the Aisuru botnet hurled record-shattering DDoS barrages from an army of up to 4 million infected machines.…

TLS 1.3 includes welcome improvements, but still allows long-lived secrets

Tricky tradeoffs are hard to avoid when designing systems, but the choice not to use LLMs for some tasks is clear

Systems Approach As we neared the finish line for our network security book, I received a piece of feedback from Brad Karp that my explanation of forward secrecy in the chapter on TLS (Transport Layer Security) was not quite right.…

Rust core library partly polished for industrial safety spec

Ferrous Systems achieves IEC 61508 (SIL 2) certification for systems that demand reliability

Memory-safe Rust code can now be more broadly applied in devices that require electronic system safety, at least as measured by International Electrotechnical Commission (IEC) standards.…

'Exploitation is imminent' as 39 percent of cloud environs have max-severity React hole

Finish reading this, then patch

A maximum-severity flaw in the widely used JavaScript library React, and several React-based frameworks including Next.js allows unauthenticated, remote attackers to execute malicious code on vulnerable instances. The flaw is easy to abuse, and mass exploitation is "imminent," according to security researchers.…

Here’s your worst nightmare: E-tailer can only resume partial sales 45 days after ransomware attack

Japan’s Askul still can’t run all its sites, but at least the fax line held up OK

Japanese e-tailer Askul has resumed online sales, 45 days after a ransomware attack.…

❌