The Register
North Korea targets macOS users in latest heist
North Korean criminals set on stealing Apple users' credentials and cryptocurrency are using a combination of social engineering and a fake Zoom software update to trick people into manually running malware on their own computers, according to Microsoft.…
Americans who masterminded Nork IT worker fraud sentenced to 200 months behind bars
Two Americans have been jailed for a combined 200 months for helping North Korea generate $5 million through fraudulent IT worker schemes.…
Git identity spoof fools Claude into giving bad code the nod
Security boffins say Anthropic's Claude can be tricked into approving malicious code with just two Git commands by spoofing a trusted developer's identity.…
Textbook titan McGraw Hill on ransomware crew's reading list after 13.5M records exposed
Textbook giant McGraw Hill has landed on a ransomware crew's leak site after an alleged Salesforce-linked misconfiguration spilled 13.5 million records into the wild.…
Microsoft announces product it doesn't want you to buy: Extended security updates for old Exchange, and Skype for Biz
Microsoft will keep delivering security updates for old versions of Exchange Server and Skype for Business Server, after admitting that some customers aren't ready to make the move to newer products.…
Server-room lock was nothing but a crock
PWNED Welcome back to Pwned, the column where we immortalize the worst vulns that organizations opened up for themselves. If you’re the kind of person who leaves your car doors unlocked with a pile of cash in the center console, this week’s story is for you.…
Google Chrome lacks protection against one of the most basic and common ways to track users online
Google markets its Chrome browser by citing its superior safety features, but according to privacy consultant Alexander Hanff, Chrome does not protect against browser fingerprinting – a method of tracking people online by capturing technical details about their browser.…
Anthropic's Project Glasswing CVE tally is still anyone's guess
Last week, Anthropic surprised the world by declaring that its latest model, Mythos, is so good at finding vulns that it would create chaos if released. Now, under the title of Project Glasswing, over 50 selected companies and orgs are allowed to test the hyped up LLM to find security holes in their own products. But just how many problems have they really discovered?…
Patch these critical Fortinet sandbox bugs that let attackers bypass login, run commands over HTTP
Watch out for more Fortinet vulns! Two critical bugs in Fortinet's sandbox could allow unauthenticated attackers to bypass authentication or execute unauthorized code on vulnerable systems.…
Automotive data biz Autovista blames ransomware for service disruption
Autovista confirms that it called in outside support to help clean up a ransomware infection currently affecting systems in Europe and Australia.…
French cops free mother and son after 20-hour crypto kidnap ordeal
A mother and her ten-year-old son are now free after being kidnapped for around 20 hours while the father was being extorted for hundreds of thousands of euros.…
Ancient Excel bug comes out of retirement for active attacks
While Microsoft was rolling out its bumper Patch Tuesday updates this week, US cybersecurity agency CISA was readying an alert about a 17-year-old critical Excel flaw now under exploit.…
Raspberry Pi OS ends open-door policy for sudo
The latest version of Raspberry Pi OS now requires a password for sudo by default.…
UK told its Big Tech habit is now a national security risk
Britain has spent years wiring its public sector into US Big Tech, and a new report says that dependence could quickly become a national security headache.…
Agents hooked into GitHub can steal creds – but Anthropic, Google, and Microsoft haven't warned users
Exclusive Security researchers hijacked three popular AI agents that integrate with GitHub Actions by using a new type of prompt injection attack to steal API keys and access tokens, and the vendors who run agents didn’t disclose the problem.…
Commvault has a Ctrl+Z for rogue AI agents
Keep your agents close and your agent-monitoring software closer. Commvault’s new AI Protect can discover and monitor AI agents running inside AWS, Azure, and GCP environments and even roll back their actions when something goes wrong.…
Microsoft's massive Patch Tuesday: It's raining bugs
Attackers exploited a spoofing vulnerability in Microsoft SharePoint Server before Redmond issued a fix as part of April's mega Patch Tuesday.…
No honor among thieves as 0APT threatens rival ransomware gang Krybit
Two rival ransomware gangs have locked horns after 0APT threatened to expose people affiliated with Krybit.…
Zombie Microsoft bugs rise from the dead, pave way for crims and ransomware scum
Crooks are exploiting four Microsoft vulnerabilities - one patched 14 years ago and another tied to ransomware activity - according to America's lead cyber-defense agency, which on Monday gave federal agencies two weeks to patch them.…
Fake Linux leader using Slack to con devs into giving up their secrets
Imagine getting asked to do something by a person in authority. An unknown malware slinger targeting open source software developers via Slack impersonated a real Linux Foundation official and used pages hosted on Google.com to steal developers' credentials and take over their systems.…