The Register
Chinese attackers are pwning your infrastructure to use in attacks, 10 countries warn
A majority of China-linked threat actors are using compromised routers and IoT devices worldwide, turning this gear into proxy networks to carry out further intrusions, steal sensitive data, and disrupt victim organizations’ operations, according to a joint 10-country advisory.…
Age checks could turn internet into an ID checkpoint, complains Proton CEO
Proton's boss has waded into the age verification fight with a warning that sounds less like child safety and more like an identity checkpoint for the entire internet.…
American farms have a new steward for their safety net, disaster programs... Palantir
Palantir has won a $300 million contract from the US Department of Agriculture (USDA) to support the National Farm Security Action Plan (NFSAP) and modernize how USDA delivers services to America's farmers.…
Medical data of 500k Biobank volunteers listed for sale on Alibaba, UK minister reveals
Breaking Details of volunteers of UK-based Biobank, which describes itself as the custodian of the world's most comprehensive biomedical dataset, are for sale on Chinese ecommerce site Alibaba.…
Hybrid clouds have two attack surfaces and you’re not paying enough attention to either
Black Hat Asia Israeli researchers found a series of flaws in Microsoft's Windows Admin Center (WAC) and suggest this shows hybrid cloud management tools are a two-way attack surface that users don't spend enough time worrying about.…
If malware via monitor cables is a matter of national security, this might be the gadget for you
GCHQ's cyber arm has entered the hardware game with its first device designed to prevent cyberattacks on display devices.…
Sharing isn’t caring if it’s an admin password
PWNED Welcome back to PWNED, the column where we celebrate the people who’ve taught us how not to secure a server. If you’ve ever tied your own shoelaces together, then tripped over them, or attempted to dive into a swimming pool but hit your head on the diving board, we’ll be talking about your cyber equivalent.…
Pass the key, passwords have passed their sell-by date
The UK's National Cyber Security Centre (NCSC) has officially endorsed passkeys as the default authentication standard, marking the first time the agency has told consumers to move away from passwords entirely.…
Another npm supply chain worm is tearing through dev environments
Yet another npm supply-chain attack is worming its way through compromised packages, stealing secrets and sensitive data as it moves through developers' environments, and it shares significant overlap with the open source infections attributed to TeamPCP last month.…
Anthropic's super-scary bug hunting model Mythos is shaping up to be a nothingburger
Anthropic's Mythos model is purportedly so good at finding vulnerabilities that the Claude-maker is afraid to make it available to the general public for fear that criminals will take advantage. But early analysis shows that Mythos may not be as dangerous as some would have you believe.…
Google unleashes even more AI security agents to fight the baddies
Google Cloud chief operating officer Francis deSouza has summed up his company's security strategy du jour as follows: "You need to use AI to fight AI."…
France's 'Secure' ID agency probes breach as crooks claim 19M records
France's National Agency for "Secure" Documents is explaining a potential data spill just as crooks online claim they've nicked a third of the country's ID information.…
Scotland Yard can keep using live facial recognition on people in London, say judges
London's Metropolitan Police Service (MPS) has survived a legal challenge that attempted to curb its rollout of live facial recognition (LFR) technology across the capital.…
Oil crisis? What oil crisis? IT spending de-coupled from wider war shock
A day after the International Energy Agency (IEA) said the US/Israel/Iran war was creating the worst energy crisis ever faced by the world, Gartner increased its growth forecasts for global IT spending by nearly three percentage points.…
Mythos found 271 Firefox flaws – but none a human couldn’t spot
The Mozilla Foundation has revealed it tested Anthropic’s bug-finding “Mythos” AI model and feels the results it experienced represent a watershed moment for software defenders.…
Nation-states want to cause harm, not just steal cash - stop handing your cyber defenses to the cheapest contractor
State-sponsored cyberattacks from Chinese intelligence and military agencies display "an eye-watering level of sophistication," UK National Cyber Security Centre CEO Richard Horne is expected to say in a less-than-cheery opening speech to kick off its annual conference.…
Murder, she wrote: Ex-FBI chief wants some ransomware crims charged with homicide
If a cyberattack leads to a death, that's murder. A former FBI cyber division chief urged the US Justice Department to consider felony homicide charges against ransomware actors when attacks on hospitals lead to patient deaths.…
More Cisco SD-WAN bugs battered in attacks
America's lead cyber-defense agency has warned that three Cisco Catalyst SD-WAN Manager bugs are under attack, and given federal agencies just four days to patch the security holes.…
macOS ClickFix attacks deliver AppleScript stealers to snarf credentials, wallets
A ClickFix campaign targeting macOS users delivers an AppleScript-based infostealer that collects credentials and live session cookies from 14 browsers, 16 cryptocurrency wallets, and more than 200 extensions.…
Yet another ex-ransomware negotiator admits turning rogue after payoff from crimelords
The third of three former ransomware negotiators accused of assisting the ALPHV/BlackCat ransomware gang in extorting US businesses has pleaded guilty, months after his two co-workers did the same.…