The Register
How hackers are fighting back against ICE surveillance tech
While watching us now seems like the least of its sins, the US Immigration and Customs Enforcement (ICE) was once best known (and despised) for its multi-billion-dollar surveillance tech budget.…
Putinswap: France trades alleged ransomware crook for conflict researcher
France has released an alleged ransomware crook wanted by the US in exchange for a conflict researcher imprisoned in Russia.…
QR codes a powerful new phishing weapon in hands of Pyongyang cyberspies
North Korean government hackers are turning QR codes into credential-stealing weapons, the FBI has warned, as Pyongyang's spies find new ways to duck enterprise security and help themselves to cloud logins.…
China-linked cybercrims abused VMware ESXi zero-days a year before disclosure
Chinese-linked cybercriminals were sitting on a working VMware ESXi hypervisor escape kit more than a year before the bugs it relied on were made public.…
Grok told to cover up as UK weighs action over AI 'undressing'
Grok has yanked its image-generation toy out of the hands of most X users after the UK government openly weighed a ban over the AI feature that "undressed" people on command.…
Help desk read irrelevant script, so techies found and fixed their own problem
On Call 2025 has ended and a new year is upon us, but The Register will continue opening Friday mornings with a fresh installment of On Call – the reader-contributed column that tells your tales of tech support.…
As agents run amok, CrowdStrike's $740M SGNL deal aims to help get a grip on identity security
CrowdStrike has signed a $740 million deal to buy identity security startup SGNL. The move underscores the growing threat of identity-based attacks as companies struggle to secure skyrocketing numbers of non-human identities, including AI agents.…
Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit
Cisco patched a bug in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products that allows remote attackers with admin-level privileges to access sensitive information - and warned that a public, proof-of-concept exploit for the flaw exists online.…
Ransomware attacks kept climbing in 2025 as gangs refused to stay dead
If 2025 was meant to be the year ransomware started dying, nobody appears to have told the attackers.…
CISA flags actively exploited Office relic alongside fresh HPE flaw
CISA has added a pair of security holes to its actively exploited list, warning that attackers are now abusing a maximum-severity bug in HPE's OneView management software and a years-old flaw in Microsoft Office.…
UK regulators swarm X after Grok generated nudes from photos
Elon Musk's X platform is under fire as UK regulators close in on mounting reports that the platform's AI chatbot, Grok, is generating sexual imagery without users' consent.…
Maximum-severity n8n flaw lets randos run your automation server
A maximum-severity bug in the popular automation platform n8n has left an estimated 100,000 servers wide open to complete takeover, courtesy of a flaw so bad it doesn't even require logging in.…
OpenAI putting bandaids on bandaids as prompt injection problems keep festering
Security researchers at Radware say they've identified several vulnerabilities in OpenAI's ChatGPT service that allow the exfiltration of personal information.…
Are criminals vibe coding malware? All signs point to yes
Interview With everyone from would-be developers to six-year-old kids jumping on the vibe coding bandwagon, it shouldn't be surprising that criminals like automated coding tools too.…
Logitech macOS mouse mayhem traced to expired dev certificate
Logitech says an expired developer certificate is to blame after swaths of customers were left infuriated when their mice malfunctioned.…
Cloudflare pours cold water on ‘BGP weirdness preceded US attack on Venezuela’ theory
Cloudflare has poured cold water on a theory that the USA’s incursion into Venezuela coincided with a cyberattack on telecoms infrastructure.…
IBM's AI agent Bob easily duped to run malware, researchers show
IBM describes its coding agent thus: "Bob is your AI software development partner that understands your intent, repo, and security standards." Unfortunately, Bob doesn't always follow those security standards.…
ESA calls cops as crims lift off 500 GB of files, say security black hole still open
exclusive The European Space Agency on Wednesday confirmed yet another massive security breach, and told The Register that the data thieves responsible will be subject to a criminal investigation. And this could be a biggie.…
Stalkerware slinger pleads guilty for selling snooper software to suspicious spouses
The US government has secured a guilty plea from a stalkerware maker in federal court, marking just the second time in more than a decade that the US has managed to prosecute a consumer spyware vendor successfully. …
Microsoft scraps Exchange Online spam clamp after customers cry foul
Microsoft has backed away from planned changes to Exchange Online after customers objected to limits designed to curb outbound email abuse.…